, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:45 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000140)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, "21e02c27febc0fec20104ae1b83b47e88754f9b5506f3c3d1948f22165b740add3b6912cbba41b01fb0740017afb023ec897a4f16cf7b75f8fe387172018b573dc27212acd119edb54e7eafbd68cac914a2b0306ef9e66e66fa20ee02d16e076e2d0133306cbcff4da9f17bd9d624bddf84351bf092a479a680f2f71275d2885a0e3d8d16be3de8c070e1c81c771849f571b4191d624951803e63fc218bca77df39fd5d8fcf0438a109538b6ba11457c428f88112a962841e153313afa31057782ff3c6711"}}, 0xfffffffffffffcf6) 11:46:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:46:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mknod(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0/file0\x00') close(r0) 11:46:45 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x410000, 0x0) 11:46:45 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:45 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x863) truncate(&(0x7f0000000000)='./file0\x00', 0x40) truncate(&(0x7f0000000240)='./file0\x00', 0x0) 11:46:45 executing program 0: mknod(&(0x7f0000000140)='./file0\x00', 0xc000, 0x0) r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='security.;'], &(0x7f0000000600)="2e0100000000000000f4302d5e008b98e50e3a08c414dc78be66e5bdd78b5a303a9474341767898ab2c4b8f15534c3a18d665a4935a0f6f5d632facf81cf68a1d9ecbf003f8c29892a99e3f06b8ec95a32f6a0826d83f15556480650740bc895ec3fb5f4107d6720e563d76ae8e38f75e93f922e40ab3b1baefa6c", 0x7b, 0x0) unlinkat(r0, &(0x7f0000000300)='./file0\x00', 0x0) 11:46:45 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:45 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:45 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x100ffe, 0x0) write$FUSE_ATTR(r0, &(0x7f00000004c0)={0x78}, 0x78) truncate(&(0x7f0000000280)='./file0\x00', 0x200000) write$FUSE_LSEEK(r0, &(0x7f0000000140)={0x18}, 0x18) 11:46:45 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x7a00, &(0x7f0000000140)=ANY=[]) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.syz\x00', &(0x7f0000000280)=""/207, 0xcf) 11:46:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:45 executing program 7: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:45 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:46:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x1, 0x0, {0x7, 0x1b}}, 0x50) 11:46:46 executing program 7: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:46 executing program 6: r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x40, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000640)) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2, 0x0, 0x10001}) 11:46:46 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mknod(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0/file0\x00') close(r0) 11:46:46 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:46 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@allow_other='allow_other', 0x2c}]}}) rmdir(&(0x7f0000000040)='./file0/file0\x00') close(r0) 11:46:46 executing program 7: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:46 executing program 5: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0x0) r0 = open(&(0x7f00000012c0)='./file1\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x1279, &(0x7f0000000100)) 11:46:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:46 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:46 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:47 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:46:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x40086602, &(0x7f0000000000)=r0) open(&(0x7f00000001c0)='./file0/file0\x00', 0x1fd, 0x0) 11:46:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:47 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x7a00, &(0x7f00000001c0)=ANY=[]) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1025, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) getdents(r0, &(0x7f00000005c0)=""/4096, 0x18) 11:46:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:47 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:47 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x1, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x21, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:47 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:47 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) [ 140.464330] device bridge_slave_1 left promiscuous mode [ 140.469925] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.486114] device bridge_slave_0 left promiscuous mode [ 140.491692] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.608499] team0 (unregistering): Port device team_slave_1 removed [ 140.621313] team0 (unregistering): Port device team_slave_0 removed [ 140.631504] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 140.645632] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 140.673673] bond0 (unregistering): Released all slaves 11:46:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:46:48 executing program 6: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r0, &(0x7f0000000140)=0x1800, 0x19000) 11:46:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) rmdir(&(0x7f0000000040)='./file0/file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) close(r0) 11:46:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:48 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:48 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:48 executing program 6: open$dir(&(0x7f0000000300)='./file0\x00', 0x40, 0x0) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x88080, 0x0) fcntl$lock(r0, 0x2, &(0x7f0000000080)) 11:46:48 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:48 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x21, 0x3}, 0x21) 11:46:48 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x101}}, 0x30) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) 11:46:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:48 executing program 6: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) close(r0) open(&(0x7f00000003c0)='./file0\x00', 0x2, 0x0) [ 141.476527] IPVS: ftp: loaded support on port[0] = 21 11:46:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:46:49 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x3}, 0x28) [ 142.215353] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.221948] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.240679] device bridge_slave_0 entered promiscuous mode [ 142.306979] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.313438] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.321603] device bridge_slave_1 entered promiscuous mode [ 142.357269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 142.384880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 142.465658] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 142.493136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 142.596544] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 142.603740] team0: Port device team_slave_0 added [ 142.627909] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 142.635712] team0: Port device team_slave_1 added [ 142.659457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 142.685938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 142.711624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 142.718702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.727189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.747493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 142.754667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.763372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.988450] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.994846] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.001498] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.007885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.015198] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 143.392265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.821302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 143.896279] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 143.970325] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 143.976488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.984244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.053179] 8021q: adding VLAN 0 to HW filter on device team0 11:46:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:52 executing program 6: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x400c6615, &(0x7f0000000780)) 11:46:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:52 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$lock(r0, 0x1, &(0x7f0000000080)) 11:46:52 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:46:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) rmdir(&(0x7f0000000040)='./file0/file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) close(r0) 11:46:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:46:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:46:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) rmdir(&(0x7f0000000040)='./file0/file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) close(r0) 11:46:52 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x0, 0x0, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7a04, &(0x7f0000000300)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='fuse\x00', 0x7a00, &(0x7f0000000200)=ANY=[]) 11:46:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:52 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000000040), 0x1000) write$FUSE_WRITE(r1, &(0x7f0000001080)={0x18}, 0x18) poll(&(0x7f0000002380)=[{r1}], 0x1, 0x7f) close(r0) 11:46:52 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0xffffffffffffffff) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:46:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:52 executing program 3: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) renameat2(r0, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file1\x00', 0x0) 11:46:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:46:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:46:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:46:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:46:53 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x400}) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x1, 0x0, 0x7903}) close(r0) 11:46:53 executing program 7: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000280)={0x10}, 0x10) 11:46:53 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$lock(r0, 0x3, &(0x7f0000000400)) 11:46:53 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:46:53 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:46:53 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:46:53 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:46:53 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:53 executing program 6: open(&(0x7f0000000000)='./file0\x00', 0x100ffe, 0x0) pipe(&(0x7f0000000180)) pipe(&(0x7f0000000100)) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000000)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x40086602, &(0x7f0000000000)=r0) open(&(0x7f00000000c0)='./file0\x00', 0x48401, 0x0) 11:46:53 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:53 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x7a08, &(0x7f00000001c0)=ANY=[]) r0 = open$dir(&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0) 11:46:53 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 146.861359] device bridge_slave_1 left promiscuous mode [ 146.867103] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.880516] device bridge_slave_0 left promiscuous mode [ 146.886203] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.902465] IPVS: ftp: loaded support on port[0] = 21 [ 146.933904] team0 (unregistering): Port device team_slave_1 removed [ 146.945931] team0 (unregistering): Port device team_slave_0 removed [ 146.956526] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 146.976242] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 147.008413] bond0 (unregistering): Released all slaves 11:46:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:46:54 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:54 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:46:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:46:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:46:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:46:54 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:46:54 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:54 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 147.686373] IPVS: ftp: loaded support on port[0] = 21 11:46:54 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:54 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:55 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:55 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:55 executing program 7: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:46:55 executing program 7: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 148.078436] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.084919] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.102751] device bridge_slave_0 entered promiscuous mode [ 148.215907] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.222418] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.263273] device bridge_slave_1 entered promiscuous mode [ 148.311912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 148.366970] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 148.652806] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.697506] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.813084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 148.820010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.022821] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.032829] team0: Port device team_slave_0 added [ 149.071063] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.079089] team0: Port device team_slave_1 added [ 149.086400] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.092798] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.111114] device bridge_slave_0 entered promiscuous mode [ 149.122415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.171621] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.180961] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.187528] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.195252] device bridge_slave_1 entered promiscuous mode [ 149.208521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 149.221673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.235954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.268788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.275999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.284531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.301555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 149.338104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 149.451369] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 149.499740] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 149.532282] device bridge_slave_1 left promiscuous mode [ 149.537849] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.551634] device bridge_slave_0 left promiscuous mode [ 149.557149] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.588074] team0 (unregistering): Port device team_slave_1 removed [ 149.599543] team0 (unregistering): Port device team_slave_0 removed [ 149.609057] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 149.625294] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 149.655352] bond0 (unregistering): Released all slaves [ 149.851901] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.862730] team0: Port device team_slave_0 added [ 149.914788] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.922956] team0: Port device team_slave_1 added [ 149.928666] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.935059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.941738] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.948116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.955810] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.964286] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 149.971867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.983220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.053309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.110918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 150.118305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.126908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.186874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 150.194279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.202863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.752352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.909848] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.916286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.922936] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.929303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.936796] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 151.776294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.852826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.977182] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 152.097486] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 152.103811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.111486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.224891] 8021q: adding VLAN 0 to HW filter on device team0 [ 152.362258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.489993] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 152.621695] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 152.628100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.635300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.750700] 8021q: adding VLAN 0 to HW filter on device team0 11:47:00 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:00 executing program 7: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 153.180307] device bridge_slave_1 left promiscuous mode [ 153.186143] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.197644] device bridge_slave_0 left promiscuous mode [ 153.203262] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.235834] team0 (unregistering): Port device team_slave_1 removed [ 153.245774] team0 (unregistering): Port device team_slave_0 removed [ 153.256929] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 153.275546] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 153.302866] bond0 (unregistering): Released all slaves 11:47:01 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:01 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) 11:47:01 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 154.647227] IPVS: ftp: loaded support on port[0] = 21 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7a, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:01 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:02 executing program 7: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) [ 155.253618] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.260069] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.267598] device bridge_slave_0 entered promiscuous mode 11:47:02 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) [ 155.299353] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.305778] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.313351] device bridge_slave_1 entered promiscuous mode [ 155.350602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 155.388396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:47:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:02 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 155.573206] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 155.615500] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 155.745160] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 155.752570] team0: Port device team_slave_0 added [ 155.779889] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 155.787251] team0: Port device team_slave_1 added [ 155.815242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.844415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.875085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.904603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.186309] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.192833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.199499] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.205886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.213358] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 157.109574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 157.152627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.198127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 157.277605] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 157.284234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.291375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.363666] 8021q: adding VLAN 0 to HW filter on device team0 11:47:04 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x40086602, &(0x7f0000000000)=r0) 11:47:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:47:04 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 11:47:04 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:04 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:05 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x40086602, &(0x7f0000000000)=r0) 11:47:05 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x40086602, &(0x7f0000000000)=r0) [ 158.045329] IPVS: ftp: loaded support on port[0] = 21 [ 158.089414] device bridge_slave_1 left promiscuous mode [ 158.095163] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.108965] device bridge_slave_0 left promiscuous mode [ 158.114796] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.157316] team0 (unregistering): Port device team_slave_1 removed [ 158.167806] team0 (unregistering): Port device team_slave_0 removed [ 158.180880] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 158.197561] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 158.234947] bond0 (unregistering): Released all slaves 11:47:05 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 11:47:05 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) 11:47:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) 11:47:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:06 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 159.126715] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.133221] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.142134] device bridge_slave_0 entered promiscuous mode [ 159.189540] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.195976] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.203849] device bridge_slave_1 entered promiscuous mode [ 159.240656] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 159.281213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 159.417440] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.478599] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:47:06 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 11:47:06 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) 11:47:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 159.733416] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 159.741708] team0: Port device team_slave_0 added 11:47:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 159.840104] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.871523] team0: Port device team_slave_1 added [ 159.942716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 11:47:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:07 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 159.992340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.105930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.113246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.122370] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.164728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.172326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.180744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 11:47:07 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) [ 160.583156] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.589616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.596291] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.602690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.610834] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 161.312550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.592373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.673072] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 161.750949] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 161.757165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.765312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.839680] 8021q: adding VLAN 0 to HW filter on device team0 11:47:09 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100007fffffff) r1 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) 11:47:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:09 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) 11:47:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:09 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) 11:47:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:09 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100007fffffff) r1 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) 11:47:09 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(0xffffffffffffffff) 11:47:09 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(0xffffffffffffffff) [ 162.530633] device bridge_slave_1 left promiscuous mode [ 162.536346] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.557292] device bridge_slave_0 left promiscuous mode [ 162.562926] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.605937] IPVS: ftp: loaded support on port[0] = 21 11:47:09 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(0xffffffffffffffff) 11:47:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) [ 162.634779] team0 (unregistering): Port device team_slave_1 removed [ 162.650831] team0 (unregistering): Port device team_slave_0 removed [ 162.672518] bond0 (unregistering): Releasing backup interface bond_slave_1 11:47:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) [ 162.693435] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 162.757204] bond0 (unregistering): Released all slaves 11:47:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:10 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:10 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:10 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) 11:47:10 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:10 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) 11:47:10 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(r0) [ 163.779620] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.786090] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.794158] device bridge_slave_0 entered promiscuous mode [ 163.847673] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.854160] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.874740] device bridge_slave_1 entered promiscuous mode [ 163.916486] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 163.964604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.084898] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 164.138356] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.465568] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.475157] team0: Port device team_slave_0 added [ 164.534880] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.544860] team0: Port device team_slave_1 added [ 164.576209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 164.583139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.591313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.624089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 164.631093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.646105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.678332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.685431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.693453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.714503] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.721580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.730125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.940244] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.946626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.953267] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.959614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.966901] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.472130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.719263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.792397] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 165.866100] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 165.872286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.879507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.949979] 8021q: adding VLAN 0 to HW filter on device team0 11:47:13 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100007fffffff) r1 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) 11:47:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(0xffffffffffffffff) 11:47:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:13 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:13 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) 11:47:13 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100007fffffff) r1 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) [ 166.565674] IPVS: ftp: loaded support on port[0] = 21 [ 166.614199] device bridge_slave_1 left promiscuous mode [ 166.619941] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.633103] device bridge_slave_0 left promiscuous mode [ 166.638664] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.692796] team0 (unregistering): Port device team_slave_1 removed [ 166.705497] team0 (unregistering): Port device team_slave_0 removed [ 166.715634] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 166.732423] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 166.765269] bond0 (unregistering): Released all slaves 11:47:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(0xffffffffffffffff) 11:47:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 167.317209] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.323772] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.339084] device bridge_slave_0 entered promiscuous mode 11:47:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:14 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:14 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 167.482203] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.488659] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.544598] device bridge_slave_1 entered promiscuous mode [ 167.605755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.654267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.769223] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 167.815074] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 168.023830] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 168.031408] team0: Port device team_slave_0 added [ 168.074816] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 168.083054] team0: Port device team_slave_1 added [ 168.126058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.175457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.222478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 168.229860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.237910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 11:47:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(0xffffffffffffffff) [ 168.284497] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 168.294431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.317804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 11:47:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:15 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 168.906241] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.912652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.919300] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.925674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.933813] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 11:47:16 executing program 5: pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000002140), 0x1000) read$FUSE(r0, &(0x7f0000001140), 0xfffffdef) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18, 0x1}, 0x200000d8) [ 169.633298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.036005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.121269] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 170.235767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 170.243466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.251622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.321228] 8021q: adding VLAN 0 to HW filter on device team0 11:47:17 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100007fffffff) r1 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) 11:47:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:17 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:17 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:18 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100007fffffff) r1 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) 11:47:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 170.969274] device bridge_slave_1 left promiscuous mode [ 170.974961] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.004826] device bridge_slave_0 left promiscuous mode [ 171.010517] bridge0: port 1(bridge_slave_0) entered disabled state 11:47:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 171.068839] IPVS: ftp: loaded support on port[0] = 21 11:47:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 171.091549] team0 (unregistering): Port device team_slave_1 removed [ 171.107420] team0 (unregistering): Port device team_slave_0 removed [ 171.123534] bond0 (unregistering): Releasing backup interface bond_slave_1 11:47:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 171.146753] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 171.198578] bond0 (unregistering): Released all slaves 11:47:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:19 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:19 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 172.144075] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.150499] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.158253] device bridge_slave_0 entered promiscuous mode [ 172.198441] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.204922] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.212422] device bridge_slave_1 entered promiscuous mode [ 172.259278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.310227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 172.451653] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.500568] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.769345] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 172.800488] team0: Port device team_slave_0 added [ 172.871890] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.881854] team0: Port device team_slave_1 added [ 172.919449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.975447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 172.982399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.997455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.021107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 173.028408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.037355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.064261] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 173.071515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.082486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.309357] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.315734] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.322366] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.328714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.336116] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 173.921110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.115213] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.192372] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 174.267968] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 174.274183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.281310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.352352] 8021q: adding VLAN 0 to HW filter on device team0 11:47:21 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:21 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:21 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:22 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 175.019424] device bridge_slave_1 left promiscuous mode [ 175.025174] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.037433] device bridge_slave_0 left promiscuous mode [ 175.043190] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.048050] IPVS: ftp: loaded support on port[0] = 21 [ 175.086142] team0 (unregistering): Port device team_slave_1 removed [ 175.096829] team0 (unregistering): Port device team_slave_0 removed [ 175.108847] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 175.128861] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 175.156396] bond0 (unregistering): Released all slaves 11:47:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:22 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:23 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 176.020226] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.026718] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.057358] device bridge_slave_0 entered promiscuous mode 11:47:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 176.104174] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.110682] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.120488] device bridge_slave_1 entered promiscuous mode 11:47:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 176.196957] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:47:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 176.300636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 176.479839] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.521789] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 176.737790] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 176.745766] team0: Port device team_slave_0 added [ 176.792537] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 176.807803] team0: Port device team_slave_1 added [ 176.848673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.911608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.980990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 176.988309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.996424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.058901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.066233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.076956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.381547] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.387921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.394550] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.400897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.408163] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 178.016215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.196609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.275922] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 178.353611] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 178.359806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.367456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.442173] 8021q: adding VLAN 0 to HW filter on device team0 11:47:26 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) 11:47:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:26 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:26 executing program 2: truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 179.124323] device bridge_slave_1 left promiscuous mode [ 179.126460] IPVS: ftp: loaded support on port[0] = 21 [ 179.129972] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.148415] device bridge_slave_0 left promiscuous mode [ 179.154078] bridge0: port 1(bridge_slave_0) entered disabled state 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 179.228432] team0 (unregistering): Port device team_slave_1 removed [ 179.248885] team0 (unregistering): Port device team_slave_0 removed [ 179.262510] bond0 (unregistering): Releasing backup interface bond_slave_1 11:47:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 179.281652] bond0 (unregistering): Releasing backup interface bond_slave_0 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 179.328156] bond0 (unregistering): Released all slaves 11:47:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) 11:47:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:27 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 180.349044] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.355520] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.363712] device bridge_slave_0 entered promiscuous mode [ 180.407371] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.413877] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.422213] device bridge_slave_1 entered promiscuous mode [ 180.473600] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 180.518182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 180.644340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.690305] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.916053] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.923518] team0: Port device team_slave_0 added [ 181.006287] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.013742] team0: Port device team_slave_1 added [ 181.051994] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.084467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 181.091482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.099656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.153198] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.160417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.174640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.206311] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.213531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.222436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.446678] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.453075] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.459726] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.466085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.473432] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.112134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.265677] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.341966] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.418220] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.424434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.432107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.504506] 8021q: adding VLAN 0 to HW filter on device team0 11:47:30 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0xc84) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:30 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:30 executing program 6: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:30 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:30 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 183.382225] IPVS: ftp: loaded support on port[0] = 21 [ 183.389530] device bridge_slave_1 left promiscuous mode [ 183.395212] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.408368] device bridge_slave_0 left promiscuous mode [ 183.413963] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.456125] team0 (unregistering): Port device team_slave_1 removed [ 183.468202] team0 (unregistering): Port device team_slave_0 removed [ 183.478985] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 183.497204] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 183.525148] bond0 (unregistering): Released all slaves 11:47:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:31 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 184.475646] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.482351] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.494893] device bridge_slave_0 entered promiscuous mode [ 184.564533] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.571063] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.579175] device bridge_slave_1 entered promiscuous mode [ 184.626260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 184.673270] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:47:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 184.817146] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.872327] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.180664] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.188635] team0: Port device team_slave_0 added [ 185.258656] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.266563] team0: Port device team_slave_1 added [ 185.304325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.311316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.323475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.343855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.350773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 185.362932] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.394526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.401713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.412962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.444885] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.452296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.463568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.740268] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.746689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.753355] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.759715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.767611] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.272131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.563553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.639984] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 186.717703] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 186.723958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.731096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.810641] 8021q: adding VLAN 0 to HW filter on device team0 11:47:34 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:34 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:34 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 187.483360] IPVS: ftp: loaded support on port[0] = 21 [ 187.521389] device bridge_slave_1 left promiscuous mode [ 187.527134] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.544081] device bridge_slave_0 left promiscuous mode [ 187.549847] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.599964] team0 (unregistering): Port device team_slave_1 removed [ 187.613885] team0 (unregistering): Port device team_slave_0 removed [ 187.624876] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 187.645132] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 187.676344] bond0 (unregistering): Released all slaves 11:47:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:35 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18}, 0x18) [ 188.427882] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.434323] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.466790] device bridge_slave_0 entered promiscuous mode [ 188.526209] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.532857] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.541551] device bridge_slave_1 entered promiscuous mode [ 188.583115] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 188.620095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.745149] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 188.800205] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 189.039483] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 189.048359] team0: Port device team_slave_0 added [ 189.108739] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 189.117969] team0: Port device team_slave_1 added 11:47:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 189.175210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 11:47:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 189.264884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:47:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 189.328255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 189.335469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.345280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 11:47:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:36 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 189.439357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 189.446699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.456718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 11:47:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) 11:47:36 executing program 4: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r1 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) open(&(0x7f0000000280)='./file0/file0\x00', 0x88042, 0x0) [ 189.902325] device bridge_slave_1 left promiscuous mode [ 189.907972] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.923131] device bridge_slave_0 left promiscuous mode [ 189.928752] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.968314] team0 (unregistering): Port device team_slave_1 removed [ 189.982506] team0 (unregistering): Port device team_slave_0 removed [ 189.993561] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 190.011141] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 190.045697] bond0 (unregistering): Released all slaves [ 190.213070] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.219550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.226235] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.232622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.240438] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 190.432985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.622521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.700615] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 191.779532] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 191.785717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.792779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.867104] 8021q: adding VLAN 0 to HW filter on device team0 11:47:39 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:39 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000001400)=[{r0, 0x41}, {r0, 0x40}, {r1}], 0x3, 0x512) write$FUSE_GETXATTR(r1, &(0x7f0000000100)={0xfffffffffffffd86}, 0x18) 11:47:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:39 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:39 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 192.519229] device bridge_slave_1 left promiscuous mode [ 192.524829] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.544233] device bridge_slave_0 left promiscuous mode [ 192.549794] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.629793] team0 (unregistering): Port device team_slave_1 removed [ 192.657739] IPVS: ftp: loaded support on port[0] = 21 [ 192.667982] team0 (unregistering): Port device team_slave_0 removed [ 192.679851] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 192.698402] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 192.763419] bond0 (unregistering): Released all slaves 11:47:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:40 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:40 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 193.682575] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.689110] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.697215] device bridge_slave_0 entered promiscuous mode [ 193.739725] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.746255] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.754642] device bridge_slave_1 entered promiscuous mode [ 193.803479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 193.869882] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.017818] IPVS: ftp: loaded support on port[0] = 21 11:47:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 194.175504] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:47:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 194.244644] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.647606] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.664453] team0: Port device team_slave_0 added [ 194.728572] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.736558] team0: Port device team_slave_1 added [ 194.772220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.804188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 194.811184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.823717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.851435] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 194.858639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.866776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.906467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 194.913792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.921969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.035442] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.041879] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.053700] device bridge_slave_0 entered promiscuous mode [ 195.116950] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.123415] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.131381] device bridge_slave_1 entered promiscuous mode [ 195.173802] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.210194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 195.312428] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.356097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.366909] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.373317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.380198] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.386659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.394663] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 195.529588] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.537076] team0: Port device team_slave_0 added [ 195.571109] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.578487] team0: Port device team_slave_1 added [ 195.612215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.647656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.683700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.720847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.808215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.089404] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.095798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.102444] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.108845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.116112] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 196.778633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.832182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.904882] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.031171] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 197.037405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.051945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.169684] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.413467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.537329] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.658487] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 197.665117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.672719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.786225] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.147246] device bridge_slave_1 left promiscuous mode [ 198.152831] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.164967] device bridge_slave_0 left promiscuous mode [ 198.170541] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.199811] team0 (unregistering): Port device team_slave_1 removed [ 198.209793] team0 (unregistering): Port device team_slave_0 removed [ 198.220505] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 198.236317] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 198.265967] bond0 (unregistering): Released all slaves 11:47:46 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, r1}) 11:47:46 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:46 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:46 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x48000, 0x0) getdents(r0, &(0x7f0000000200)=""/41, 0x29) 11:47:46 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x2e, 0x2, 0x0, {0x0, 0x0, 0x5, 0x0, 'nodev'}}, 0x2e) 11:47:46 executing program 4: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000100)=""/107, 0xffffffffffffff00) close(r0) 11:47:46 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='fuse\x00', 0x0, &(0x7f0000001440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INTERRUPT(r0, &(0x7f0000001580)={0x10, 0x0, 0x5}, 0x10) 11:47:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(r1, r0, &(0x7f0000000140)=0x1800, 0x10001) 11:47:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r1, 0x0, 0x7fffffff) sendfile(r1, r0, &(0x7f0000000140)=0x1800, 0x10001) 11:47:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r1, 0x0, 0x7fffffff) write$FUSE_ATTR(r0, &(0x7f0000000180)={0x78}, 0x78) read$FUSE(r0, &(0x7f0000000480), 0x1000) 11:47:47 executing program 4: mknod$loop(&(0x7f0000000140)='./file1\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x0) 11:47:47 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x1400) [ 200.863576] IPVS: ftp: loaded support on port[0] = 21 [ 201.209943] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.216344] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.223509] device bridge_slave_0 entered promiscuous mode [ 201.248768] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.255146] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.262286] device bridge_slave_1 entered promiscuous mode [ 201.286524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 201.311306] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 201.379369] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 201.406128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 201.510968] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.518257] team0: Port device team_slave_0 added [ 201.542010] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.549276] team0: Port device team_slave_1 added [ 201.573518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.599236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.624975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.651986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.876898] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.883301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.889944] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.896303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.690132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.769269] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 202.846544] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 202.852776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.860334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.933405] 8021q: adding VLAN 0 to HW filter on device team0 11:47:50 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x90802) read$FUSE(r0, &(0x7f0000000180), 0x1000) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1}, 0x18) sendfile(r1, r1, 0x0, 0x7fffffff) 11:47:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:50 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:50 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7a00, &(0x7f0000000180)=ANY=[]) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x100000, &(0x7f0000000100)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x7a00, &(0x7f00000001c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6800, &(0x7f0000000300)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:47:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000000000000000081c00000010000000000000000"], 0x29) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x101}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) [ 203.598231] device bridge_slave_1 left promiscuous mode [ 203.603888] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.605838] IPVS: ftp: loaded support on port[0] = 21 [ 203.630517] device bridge_slave_0 left promiscuous mode [ 203.636228] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.687734] team0 (unregistering): Port device team_slave_1 removed [ 203.698562] team0 (unregistering): Port device team_slave_0 removed [ 203.708535] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 203.724409] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 203.761251] bond0 (unregistering): Released all slaves 11:47:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:51 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:51 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:51 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x4020940d, &(0x7f0000000080)=r0) 11:47:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x3}}, 0x50) 11:47:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000700)={&(0x7f0000000040)=@bridge_getneigh={0x20, 0x1e, 0x601, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) 11:47:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/.yz0\x00', 0x1ff) 11:47:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x178, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)="73397a6b6185fab57200", 0x0, 0xfb, &(0x7f0000000140)=""/251}, 0x48) r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) [ 204.745489] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.752064] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.766105] device bridge_slave_0 entered promiscuous mode 11:47:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x178, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)="73397a6b6185fab57200", 0x0, 0xfb, &(0x7f0000000140)=""/251, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0xfffffffffffffe26) r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89a1, &(0x7f0000000000)) [ 204.852967] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.859559] bridge0: port 2(bridge_slave_1) entered disabled state 11:47:52 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x178, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)="73397a6b6185fab57200", 0x4, 0xfb, &(0x7f0000000140)=""/251, 0x40f00, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='^#bdev+eth0[+{*vmnet0bdevcgroup%GPL:\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)}], 0x1, &(0x7f0000000440)=[{0x60, 0x104, 0x0, "5e02b0f74d7f7ba6cc6f2abe8097115b8937ed67931655b2be5339b21f3481021a7008f360873afbeb14cd0726d73dc6552f80fa74f894044bdca3e5fca0d4afd2657ff1b2de688288360bb8"}, {0xf0, 0x11e, 0x0, "7667e8f227b94edad481feb406a38e2786112cee6657b3282746e57b9b50f1586fda51ecf8901d4efd342da93dfae68e14c619fd791bfac11925704a16f84d34763813114bcf90695e95348e471f1687ac276c559b721a738423a93ea5d5e225ceb3a539ff300d3c614639cb90b8d9a30ae540eb5e1cc668517c7e93f2ac28fb8ef17a50a2ab3cd54701857dd6b4eaa6f55fbfff16a895fd86a6ebbad76c1f25152af4b8518097c51ebbbf59b830ba4ff33ae5b15b370d85f3f0596211d6a4bc7cd79d7d141dac18e93f72290a5aa11aba595ea1708332618b45"}], 0x150, 0x884}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2000000000004a}, 0xfffffffffffffe26) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") r3 = socket$kcm(0xa, 0x2, 0x0) socketpair$inet6_sctp(0xa, 0x8, 0x84, &(0x7f0000000740)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a00)={r0, 0x0, 0x2f, 0x75, &(0x7f0000000340)="c5aea5dfbdc08dd004a20d08bf7c4ffee0a3a737f711c0d3178fbd67cd45d7afaf787e90d4c6dab79fb87eb8a5a56a", &(0x7f0000000980)=""/117, 0x60}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) [ 204.900350] device bridge_slave_1 entered promiscuous mode [ 204.993215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.064857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.238961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 205.294826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 205.606290] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 205.613750] team0: Port device team_slave_0 added [ 205.662673] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 205.669778] team0: Port device team_slave_1 added [ 205.721278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.728583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.739633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.772078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.797066] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 205.804254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.812304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.832861] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 205.839920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.847974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.055798] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.062178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.069212] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.075567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.083195] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 206.560632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.870326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.949339] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 207.027964] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 207.034187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.041281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.116228] 8021q: adding VLAN 0 to HW filter on device team0 11:47:54 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:54 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="c10800000084fea3f4ff000000", 0xd}], 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 11:47:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:54 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:54 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:54 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000000)) 11:47:54 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a26b76051b159a9c84a2c60d29800000020") [ 207.668274] can: request_module (can-proto-0) failed. [ 207.682439] can: request_module (can-proto-0) failed. 11:47:54 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000a00)=@setlink={0x28, 0x13, 0x409, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x8, 0x2b, [@nested={0x4, 0x3}]}]}, 0x28}, 0x1}, 0x0) [ 207.815465] device bridge_slave_1 left promiscuous mode [ 207.821137] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.824986] IPVS: ftp: loaded support on port[0] = 21 [ 207.843851] device bridge_slave_0 left promiscuous mode [ 207.849448] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.887276] team0 (unregistering): Port device team_slave_1 removed [ 207.899543] team0 (unregistering): Port device team_slave_0 removed [ 207.910952] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 207.929830] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 207.965159] bond0 (unregistering): Released all slaves 11:47:55 executing program 4: r0 = epoll_create(0x3f) epoll_wait(r0, &(0x7f0000000100)=[{}], 0x1, 0x4) [ 207.990679] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 208.003643] netlink: 'syz-executor4': attribute type 3 has an invalid length. 11:47:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)="760c5d7819d563eedb", 0x9) 11:47:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 11:47:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x800000000008983, &(0x7f0000000040)='|') 11:47:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x800000000008983, &(0x7f0000000040)='|') 11:47:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg(r0, &(0x7f0000000880)=[{{&(0x7f0000000380)=@xdp={0x2c}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000440)=[{0x40, 0x0, 0x0, "8ff8de81551d34f545227046552f9fdc755a7c8e66b56d2e6935f3cd542be844da5819fb131eb7aa448c15886f"}, {0x80, 0x0, 0x8, "172478656b482517cf6ea6c134d6e4dcc17cc4d305410fe2531c836a7713ee0e2150746645da55395af9c8491e50faee39a79823652956ffd75c871fbe2a68136f119064cb5cd8c1d854e193df9da1b391bb976829afedb2f17366fe7704da472deb15046e888ebb8cbf47f9fde8f9"}, {0xb8, 0x105, 0x0, "6856c77b09fe46e7823fa7e7754263acd1ec59e7cb899072ccbc4bc4042efd05937eaeae4db400f512081636a5710823ea46110383158b94c695bbae151825127171826d9766191142d835b34a88c0e8f26c1766178ebd706b08d3c24e4cb02e0761600a77f42fb6f62bd8c62f682318889671016b7f7cb39bab14a2024549f70736549ee4479c7628c1faf3f8ab7e35e5413b9607443213db7299eeb7fdbc036eb568"}, {0xf8, 0x115, 0x6d23, "de4caf8f6006bfdde760428eeb55b487cda07e5f545ebb155dac0f7a87f0d2c2b1abbf1c9ea6e19e30b97b6a7f605b10ccd89058b145b5897c14316673dea415d24c8db7a974686c6d38868b102fa349993697daf00a3c46b43033dc98843a6f2aa5d60ebc56f5bc47e9cbe40a37215d0ab64b896b990d6d98df26d9e1250e50288423fdb199e61b2cf0ecd57dd26bd6825f4a2f776de1890386abb468056ce4936bda363e4b6622670facdcfd2f6c0acaa424f716ffda1b4f2af8507f44bd2d12b83d088f9bb40b1e856a433ece0036caae911e20215d3f94aedc73ae5402872577"}], 0x270}, 0x7fff}], 0x1, 0x800) 11:47:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:55 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x800000000008983, &(0x7f0000000040)='|') setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'lo\x00', 0x4}, 0x18) 11:47:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:55 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYBLOB="000000000023000008001b0000000000"], 0x2}, 0x1}, 0x0) [ 209.082738] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.089257] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.097946] device bridge_slave_0 entered promiscuous mode [ 209.142303] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.148762] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.156635] device bridge_slave_1 entered promiscuous mode [ 209.202144] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.245761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 209.404709] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.453841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.723724] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.744342] team0: Port device team_slave_0 added [ 209.801662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 209.809605] team0: Port device team_slave_1 added [ 209.841350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 209.848275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 209.863282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.894457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 209.901377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.909436] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.936011] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 209.943335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.952582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.992886] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.000204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.010474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.220787] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.227210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.233846] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.240195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.247460] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 210.720481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.022916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.099123] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 211.175597] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 211.181785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.188799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.259836] 8021q: adding VLAN 0 to HW filter on device team0 11:47:58 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:58 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) close(r1) 11:47:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:58 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:58 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x14, &(0x7f00000000c0)={0x1}, 0x3) 11:47:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:59 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x178, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)="73397a6b6185fab57200", 0x4, 0xfb, &(0x7f0000000140)=""/251, 0x40f00, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='^#bdev+eth0[+{*vmnet0bdevcgroup%GPL:\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)}], 0x1, &(0x7f0000000440)=[{0x60, 0x104, 0x0, "5e02b0f74d7f7ba6cc6f2abe8097115b8937ed67931655b2be5339b21f3481021a7008f360873afbeb14cd0726d73dc6552f80fa74f894044bdca3e5fca0d4afd2657ff1b2de688288360bb8"}, {0xf0, 0x11e, 0x0, "7667e8f227b94edad481feb406a38e2786112cee6657b3282746e57b9b50f1586fda51ecf8901d4efd342da93dfae68e14c619fd791bfac11925704a16f84d34763813114bcf90695e95348e471f1687ac276c559b721a738423a93ea5d5e225ceb3a539ff300d3c614639cb90b8d9a30ae540eb5e1cc668517c7e93f2ac28fb8ef17a50a2ab3cd54701857dd6b4eaa6f55fbfff16a895fd86a6ebbad76c1f25152af4b8518097c51ebbbf59b830ba4ff33ae5b15b370d85f3f0596211d6a4bc7cd79d7d141dac18e93f72290a5aa11aba595ea1708332618b45"}], 0x150, 0x884}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2000000000004a}, 0xfffffffffffffe26) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") r3 = socket$kcm(0xa, 0x2, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a00)={r0, 0x0, 0x2f, 0x75, &(0x7f0000000340)="c5aea5dfbdc08dd004a20d08bf7c4ffee0a3a737f711c0d3178fbd67cd45d7afaf787e90d4c6dab79fb87eb8a5a56a", &(0x7f0000000980)=""/117, 0x60}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 11:47:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:59 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:47:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1c, 0x20001, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) 11:47:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:59 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)="6c6f3a26b76051b159a9c84a2c60d29800000020") [ 212.008073] device bridge_slave_1 left promiscuous mode [ 212.013670] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.045493] device bridge_slave_0 left promiscuous mode [ 212.051182] bridge0: port 1(bridge_slave_0) entered disabled state 11:47:59 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 212.123337] IPVS: ftp: loaded support on port[0] = 21 [ 212.160803] team0 (unregistering): Port device team_slave_1 removed [ 212.174483] team0 (unregistering): Port device team_slave_0 removed [ 212.186881] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 212.205992] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 212.235351] bond0 (unregistering): Released all slaves 11:47:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:47:59 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:47:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x178, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)="73397a6b6185fab57200", 0x0, 0xfb, &(0x7f0000000140)=""/251, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0xfffffffffffffe26) r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 11:47:59 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:47:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:47:59 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:47:59 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:47:59 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x178, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)="73397a6b6185fab57200", 0x4, 0xfb, &(0x7f0000000140)=""/251, 0x40f00, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='^#bdev+eth0[+{*vmnet0bdevcgroup%GPL:\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)}], 0x1, &(0x7f0000000440)=[{0xf8, 0x1b9, 0x2, "9d1952f888549cee6fb2610b6d1e6570d1a1918e30db4ccb412db59ca600e6ab681072e1d71ad4a3173176a2bee82d17cb7f5b288f4bcfb36089baa247dbfc7bff49ff3e34d6d71efa3b2ac5a81511e1095e4736677d96caf3142af684cf2dbbd6b84885c0cb83573707ac3b78948f3020be4e6d93fe46c7db57db9258b5a98dfc320845fe323d56ad2f06a26936526f6faf28659e01108b7acce4b2b64adfd4cba7846cd9b26a0a90b3110466c74fc4e82536a4aed523f9958fb4c12a1740551d4403d53efc204dae8ef2100ace39fa84dd4b5fae84c8fc44e47ac5ebf2372464488ba2"}, {0x60, 0x104, 0x0, "5e02b0f74d7f7ba6cc6f2abe8097115b8937ed67931655b2be5339b21f3481021a7008f360873afbeb14cd0726d73dc6552f80fa74f894044bdca3e5fca0d4afd2657ff1b2de688288360bb8"}, {0xb8, 0x112, 0x8, "4c683aad859459ee743bfc3947908c681a7700e21eb9c9b2011743af632765fe1cf300ad0eed078f9f93db5ecb18b41611deedb1d653a09f2ae09ca4d80ba75beaee3e236088e510b4c2164eecb7a25a4d8bd5362355d76d914f4b6465b6bf717a762d4ae4d057b73ad4e04df36148bf93944186339af9069ae492254bece33a3e4aa830899bc125d487d40380b3265175df73b52055a29224540f4bd386a1784285d8"}, {0xf0, 0x11e, 0x0, "7667e8f227b94edad481feb406a38e2786112cee6657b3282746e57b9b50f1586fda51ecf8901d4efd342da93dfae68e14c619fd791bfac11925704a16f84d34763813114bcf90695e95348e471f1687ac276c559b721a738423a93ea5d5e225ceb3a539ff300d3c614639cb90b8d9a30ae540eb5e1cc668517c7e93f2ac28fb8ef17a50a2ab3cd54701857dd6b4eaa6f55fbfff16a895fd86a6ebbad76c1f25152af4b8518097c51ebbbf59b830ba4ff33ae5b15b370d85f3f0596211d6a4bc7cd79d7d141dac18e93f72290a5aa11aba595ea1708332618b45"}], 0x300, 0x884}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2000000000004a}, 0xfffffffffffffe26) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") r3 = socket$kcm(0xa, 0x2, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a00)={r0, 0x0, 0x2f, 0x75, &(0x7f0000000340)="c5aea5dfbdc08dd004a20d08bf7c4ffee0a3a737f711c0d3178fbd67cd45d7afaf787e90d4c6dab79fb87eb8a5a56a", &(0x7f0000000980)=""/117, 0x60}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890c, &(0x7f0000000000)) 11:48:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 213.258767] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.265228] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.272922] device bridge_slave_0 entered promiscuous mode [ 213.316575] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.323066] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.331000] device bridge_slave_1 entered promiscuous mode [ 213.374289] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.415981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.545776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.593941] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.834540] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 213.854428] team0: Port device team_slave_0 added [ 213.904854] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 213.912068] team0: Port device team_slave_1 added [ 213.936102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.943060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.950983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.980309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.987894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.995808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.033852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.041000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.049549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.070796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.077944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.086366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.302652] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.309084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.315743] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.322098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.329551] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.880152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.146765] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.226419] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.302834] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.309077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.316137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.389224] 8021q: adding VLAN 0 to HW filter on device team0 11:48:03 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:48:03 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000101ff1700000000000004000000000008001500000000110800080000000000"], 0x24}, 0x1}, 0x0) 11:48:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:03 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:03 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:03 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:03 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000100)) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000280), 0x3ca) 11:48:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:03 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=r2) 11:48:03 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000006740)={&(0x7f0000005500)=@xdp, 0x80, &(0x7f0000005700), 0x0, &(0x7f0000005740)=""/4096, 0x1000}, 0x0) [ 216.171258] device bridge_slave_1 left promiscuous mode [ 216.176928] bridge0: port 2(bridge_slave_1) entered disabled state 11:48:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:03 executing program 7: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 216.211580] device bridge_slave_0 left promiscuous mode [ 216.217369] bridge0: port 1(bridge_slave_0) entered disabled state 11:48:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 216.364497] team0 (unregistering): Port device team_slave_1 removed [ 216.369915] IPVS: ftp: loaded support on port[0] = 21 [ 216.397244] team0 (unregistering): Port device team_slave_0 removed [ 216.418525] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 216.436914] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 216.466938] bond0 (unregistering): Released all slaves 11:48:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:04 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:04 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000006740)={&(0x7f0000005500)=@xdp, 0x80, &(0x7f0000005700), 0x0, &(0x7f0000005740)=""/4096, 0x1000}, 0x0) 11:48:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:04 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10}, 0x10) 11:48:04 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:04 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0xc0045878, &(0x7f0000000240)) 11:48:04 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 217.414102] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.420626] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.428522] device bridge_slave_0 entered promiscuous mode [ 217.475641] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.482080] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.489878] device bridge_slave_1 entered promiscuous mode [ 217.534856] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 217.587986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.735225] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.790775] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.098050] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.105966] team0: Port device team_slave_0 added [ 218.142251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.149794] team0: Port device team_slave_1 added [ 218.179217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 218.186539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.194776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.216520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.240978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.248119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.256009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.275560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.282651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.290795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.504970] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.511363] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.518004] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.524383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.531661] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.104193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.328675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.407148] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 219.485377] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 219.491713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.499292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.571495] 8021q: adding VLAN 0 to HW filter on device team0 11:48:07 executing program 2: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)) 11:48:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 11:48:07 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:07 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10}, 0x10) 11:48:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f00000001c0)="ed", 0x1, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) listen(r0, 0x81) accept4(r0, &(0x7f00000003c0)=@in={0x0, 0x0, @multicast1}, &(0x7f0000000ac0)=0x80, 0x0) close(0xffffffffffffffff) 11:48:07 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:07 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 11:48:07 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000000c0)={r3}, 0x10) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) 11:48:07 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 220.234287] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 11:48:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:07 executing program 2: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:08 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f00000001c0)="ed", 0x1, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) listen(r0, 0x81) accept4(r0, &(0x7f00000003c0)=@in={0x0, 0x0, @multicast1}, &(0x7f0000000ac0)=0x80, 0x0) close(0xffffffffffffffff) 11:48:08 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10}, 0x10) 11:48:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:08 executing program 2: 11:48:08 executing program 2: 11:48:08 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:08 executing program 2: 11:48:08 executing program 2: 11:48:08 executing program 2: 11:48:08 executing program 2: 11:48:09 executing program 2: 11:48:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90}, 0x90) 11:48:09 executing program 4: 11:48:09 executing program 2: 11:48:09 executing program 6: 11:48:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:09 executing program 4: 11:48:09 executing program 2: 11:48:09 executing program 6: 11:48:09 executing program 4: 11:48:09 executing program 6: 11:48:09 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:09 executing program 2: 11:48:09 executing program 4: 11:48:09 executing program 2: 11:48:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:10 executing program 6: 11:48:10 executing program 4: 11:48:10 executing program 2: 11:48:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90}, 0x90) 11:48:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:10 executing program 4: 11:48:10 executing program 2: 11:48:10 executing program 6: 11:48:10 executing program 4: 11:48:10 executing program 2: 11:48:10 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:10 executing program 6: 11:48:10 executing program 2: 11:48:10 executing program 4: 11:48:11 executing program 4: 11:48:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:11 executing program 2: 11:48:11 executing program 6: 11:48:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:11 executing program 4: 11:48:11 executing program 4: 11:48:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90}, 0x90) 11:48:11 executing program 6: 11:48:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:11 executing program 2: 11:48:11 executing program 4: 11:48:11 executing program 6: 11:48:11 executing program 2: 11:48:11 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:11 executing program 4: 11:48:11 executing program 4: 11:48:12 executing program 6: 11:48:12 executing program 2: 11:48:12 executing program 4: 11:48:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:12 executing program 4: 11:48:12 executing program 6: 11:48:12 executing program 2: 11:48:12 executing program 4: 11:48:12 executing program 3: 11:48:12 executing program 2: 11:48:12 executing program 6: 11:48:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:12 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:12 executing program 2: 11:48:12 executing program 3: 11:48:12 executing program 4: 11:48:12 executing program 6: 11:48:12 executing program 3: 11:48:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:13 executing program 4: 11:48:13 executing program 2: 11:48:13 executing program 6: 11:48:13 executing program 3: 11:48:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:13 executing program 4: 11:48:13 executing program 6: 11:48:13 executing program 3: 11:48:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:13 executing program 3: 11:48:13 executing program 2: 11:48:13 executing program 6: 11:48:13 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:13 executing program 4: 11:48:13 executing program 6: 11:48:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) 11:48:14 executing program 3: 11:48:14 executing program 4: 11:48:14 executing program 2: 11:48:14 executing program 6: 11:48:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:14 executing program 4: 11:48:14 executing program 3: 11:48:14 executing program 6: 11:48:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:14 executing program 2: 11:48:14 executing program 4: 11:48:14 executing program 6: 11:48:14 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:14 executing program 3: 11:48:14 executing program 2: 11:48:15 executing program 3: 11:48:15 executing program 4: 11:48:15 executing program 6: 11:48:15 executing program 2: 11:48:15 executing program 3: 11:48:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:15 executing program 4: 11:48:15 executing program 2: 11:48:15 executing program 6: 11:48:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)="2f67726f1d562264702e7354cc7400", 0x2761, 0x0) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[], 0x130827) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 11:48:15 executing program 6: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x402c542c, &(0x7f0000000000)) 11:48:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000500)=[{0x10}], 0x10}, 0x0) [ 228.340238] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:48:15 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:15 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x800, 0x0) read(r0, &(0x7f0000000040)=""/4, 0x4) 11:48:15 executing program 6: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) setxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000480)=@random={'trusted.', '.(/vboxnet0-^\x00'}, &(0x7f0000000500)="2e282f76626f786e6574302d5e00c63c933bab4d06ef49bd54a13209e7688a07915801000000000000008d4d9f9f0710408c0d4e597c6925210ab35ccee293266779a122fb1243270d6e7c7b29e5b25b576d92a832ba82fd7a352d", 0x5b, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '.(/vboxnet0-^\x00'}, &(0x7f0000000080)='&\x00', 0x5b, 0x0) 11:48:15 executing program 4: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0x0) r0 = open(&(0x7f00000012c0)='./file1\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x4c05, &(0x7f0000000100)) 11:48:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5}, 0x30) 11:48:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:16 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) close(0xffffffffffffffff) 11:48:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) 11:48:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x3}, 0x28) 11:48:16 executing program 4 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 229.453189] FAULT_INJECTION: forcing a failure. [ 229.453189] name failslab, interval 1, probability 0, space 0, times 1 [ 229.464550] CPU: 0 PID: 14499 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 229.471914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.481274] Call Trace: [ 229.483868] dump_stack+0x1c9/0x2b4 [ 229.487500] ? dump_stack_print_info.cold.2+0x52/0x52 [ 229.492704] should_fail.cold.4+0xa/0x1a [ 229.496761] ? lock_downgrade+0x8f0/0x8f0 [ 229.500898] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 229.506009] ? find_held_lock+0x36/0x1c0 [ 229.510075] ? find_held_lock+0x36/0x1c0 [ 229.514161] ? check_same_owner+0x340/0x340 [ 229.518499] ? rcu_note_context_switch+0x730/0x730 [ 229.523444] ? wait_for_completion+0x8d0/0x8d0 [ 229.528039] __should_failslab+0x124/0x180 [ 229.532284] should_failslab+0x9/0x14 [ 229.536093] kmem_cache_alloc+0x2af/0x760 [ 229.540254] getname_flags+0xd0/0x5a0 [ 229.544052] getname+0x19/0x20 [ 229.547232] do_sys_open+0x3a2/0x760 [ 229.550946] ? filp_open+0x80/0x80 [ 229.554495] ? syscall_slow_exit_work+0x500/0x500 [ 229.559332] __x64_sys_open+0x7e/0xc0 [ 229.563135] do_syscall_64+0x1b9/0x820 [ 229.567032] ? finish_task_switch+0x1d3/0x870 [ 229.571528] ? syscall_return_slowpath+0x5e0/0x5e0 [ 229.576454] ? syscall_return_slowpath+0x31d/0x5e0 [ 229.581385] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 229.586759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.591612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.596802] RIP: 0033:0x455a79 [ 229.599981] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.619303] RSP: 002b:00007fb520e08c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 229.627021] RAX: ffffffffffffffda RBX: 00007fb520e096d4 RCX: 0000000000455a79 [ 229.634288] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000180 [ 229.641561] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 229.648821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 229.656104] R13: 00000000004eb63f R14: 00000000004d0140 R15: 0000000000000000 11:48:17 executing program 6 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:17 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:17 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 229.942703] FAULT_INJECTION: forcing a failure. [ 229.942703] name failslab, interval 1, probability 0, space 0, times 0 [ 229.954063] CPU: 1 PID: 14517 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 229.961433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.970880] Call Trace: [ 229.973491] dump_stack+0x1c9/0x2b4 [ 229.977136] ? dump_stack_print_info.cold.2+0x52/0x52 [ 229.982351] should_fail.cold.4+0xa/0x1a [ 229.986430] ? fault_create_debugfs_attr+0x1f0/0x1f0 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x11, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x88, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 229.991550] ? find_held_lock+0x36/0x1c0 [ 229.995630] ? find_held_lock+0x36/0x1c0 [ 229.999720] ? check_same_owner+0x340/0x340 [ 230.004063] ? rcu_note_context_switch+0x730/0x730 [ 230.009005] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 230.013957] __should_failslab+0x124/0x180 [ 230.018205] should_failslab+0x9/0x14 [ 230.022014] kmem_cache_alloc+0x2af/0x760 [ 230.026171] ? __lock_is_held+0xb5/0x140 [ 230.030244] getname_flags+0xd0/0x5a0 [ 230.034059] user_path_at_empty+0x2d/0x50 [ 230.038226] path_setxattr+0xd6/0x230 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 230.042040] ? setxattr+0x450/0x450 [ 230.045678] ? __ia32_sys_read+0xb0/0xb0 [ 230.049849] __x64_sys_setxattr+0xc4/0x150 [ 230.054093] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 230.059120] do_syscall_64+0x1b9/0x820 [ 230.063029] ? syscall_return_slowpath+0x5e0/0x5e0 [ 230.067976] ? syscall_return_slowpath+0x31d/0x5e0 [ 230.072932] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 230.078316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.083180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.088376] RIP: 0033:0x455a79 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 230.091560] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.110932] RSP: 002b:00007fec46534c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 230.118660] RAX: ffffffffffffffda RBX: 00007fec465356d4 RCX: 0000000000455a79 [ 230.125938] RDX: 0000000020000280 RSI: 0000000020000240 RDI: 0000000020000180 [ 230.136351] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 230.143631] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000014 [ 230.150908] R13: 00000000004bbbe9 R14: 00000000004d3170 R15: 0000000000000000 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:17 executing program 3 (fault-call:6 fault-nth:0): mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 230.315416] FAULT_INJECTION: forcing a failure. [ 230.315416] name failslab, interval 1, probability 0, space 0, times 0 [ 230.326938] CPU: 1 PID: 14545 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #143 [ 230.334308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.343665] Call Trace: [ 230.346260] dump_stack+0x1c9/0x2b4 [ 230.349893] ? dump_stack_print_info.cold.2+0x52/0x52 [ 230.355089] ? print_usage_bug+0xc0/0xc0 [ 230.359172] should_fail.cold.4+0xa/0x1a 11:48:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:17 executing program 4 (fault-call:4 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 230.363247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 230.368366] ? graph_lock+0x170/0x170 [ 230.372180] ? __lock_acquire+0x7fc/0x5020 [ 230.376421] ? graph_lock+0x170/0x170 [ 230.380244] ? __lock_is_held+0xb5/0x140 [ 230.384309] ? trace_hardirqs_on+0x10/0x10 [ 230.388572] ? check_same_owner+0x340/0x340 [ 230.392907] ? rcu_note_context_switch+0x730/0x730 [ 230.397851] __should_failslab+0x124/0x180 [ 230.402099] should_failslab+0x9/0x14 [ 230.405915] kmem_cache_alloc+0x2af/0x760 [ 230.410088] jbd2__journal_start+0x1e7/0xa80 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x37, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 230.414506] ? jbd2_write_access_granted.part.8+0x430/0x430 [ 230.420219] ? rcu_note_context_switch+0x730/0x730 [ 230.425168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.430723] __ext4_journal_start_sb+0x182/0x600 [ 230.435494] ? ext4_ioctl_setflags+0x278/0x7d0 [ 230.440092] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 230.445830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.451381] ? security_capable+0x99/0xc0 [ 230.455548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.461100] ? ns_capable_common+0x13f/0x170 [ 230.465527] ext4_ioctl_setflags+0x278/0x7d0 [ 230.469955] ? ext4_ioc_getfsmap+0xed0/0xed0 [ 230.474375] ? down_read+0x1d0/0x1d0 [ 230.478100] ? __mnt_want_write_file+0x87/0xc0 [ 230.482690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.488230] ext4_ioctl+0xe41/0x4210 [ 230.491932] ? find_held_lock+0x36/0x1c0 [ 230.495987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.501512] ? ext4_ioctl_group_add+0x560/0x560 [ 230.506164] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 230.511707] ? _kstrtoull+0x188/0x250 [ 230.515511] ? _parse_integer+0x190/0x190 [ 230.519641] ? graph_lock+0x170/0x170 [ 230.523422] ? lock_release+0xa30/0xa30 [ 230.527381] ? find_held_lock+0x36/0x1c0 [ 230.531428] ? find_held_lock+0x36/0x1c0 [ 230.535489] ? lock_downgrade+0x8f0/0x8f0 [ 230.539653] ? kasan_check_read+0x11/0x20 [ 230.543794] ? rcu_is_watching+0x8c/0x150 [ 230.547922] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 230.552319] ? __fget+0x414/0x670 [ 230.555773] ? match_held_lock+0x821/0x8d0 [ 230.559997] ? expand_files.part.8+0x9c0/0x9c0 [ 230.564580] ? kasan_check_write+0x14/0x20 [ 230.568816] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 230.573732] ? ext4_ioctl_group_add+0x560/0x560 [ 230.578392] do_vfs_ioctl+0x1de/0x1720 [ 230.582272] ? __lock_is_held+0xb5/0x140 [ 230.586315] ? ioctl_preallocate+0x300/0x300 [ 230.590719] ? __fget_light+0x2f7/0x440 [ 230.594685] ? fget_raw+0x20/0x20 [ 230.598121] ? __sb_end_write+0xac/0xe0 [ 230.602078] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 230.607606] ? fput+0x130/0x1a0 [ 230.610868] ? ksys_write+0x1ae/0x260 [ 230.614671] ? security_file_ioctl+0x94/0xc0 [ 230.619087] ksys_ioctl+0xa9/0xd0 [ 230.622546] __x64_sys_ioctl+0x73/0xb0 [ 230.626445] do_syscall_64+0x1b9/0x820 [ 230.630346] ? finish_task_switch+0x1d3/0x870 [ 230.634857] ? syscall_return_slowpath+0x5e0/0x5e0 [ 230.639774] ? syscall_return_slowpath+0x31d/0x5e0 [ 230.644692] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 230.650045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.654890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.660071] RIP: 0033:0x455a79 [ 230.663243] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.682487] RSP: 002b:00007fc7446d0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 230.690203] RAX: ffffffffffffffda RBX: 00007fc7446d16d4 RCX: 0000000000455a79 [ 230.697470] RDX: 0000000020000000 RSI: 0000000040086602 RDI: 0000000000000015 [ 230.704728] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 230.712001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 230.719269] R13: 00000000004bd3da R14: 00000000004cbc70 R15: 0000000000000000 [ 230.766666] FAULT_INJECTION: forcing a failure. [ 230.766666] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 230.778530] CPU: 0 PID: 14562 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 230.785901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.795261] Call Trace: [ 230.797865] dump_stack+0x1c9/0x2b4 [ 230.801515] ? dump_stack_print_info.cold.2+0x52/0x52 [ 230.806719] ? do_raw_spin_lock+0xc1/0x200 [ 230.810974] should_fail.cold.4+0xa/0x1a [ 230.815054] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 230.820157] ? trace_hardirqs_on+0x10/0x10 [ 230.824378] ? _parse_integer+0x13b/0x190 [ 230.828538] ? graph_lock+0x170/0x170 [ 230.832327] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 230.837851] ? _kstrtoull+0x188/0x250 [ 230.841651] ? _parse_integer+0x190/0x190 [ 230.845799] ? graph_lock+0x170/0x170 [ 230.849584] ? lock_release+0xa30/0xa30 [ 230.853546] ? find_held_lock+0x36/0x1c0 [ 230.857654] ? graph_lock+0x170/0x170 [ 230.861458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.866984] ? should_fail+0x223/0xbed [ 230.870869] ? lock_downgrade+0x8f0/0x8f0 [ 230.875009] __alloc_pages_nodemask+0x36e/0xdb0 [ 230.879674] ? find_held_lock+0x36/0x1c0 [ 230.883733] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 230.888740] ? find_held_lock+0x36/0x1c0 [ 230.892800] ? check_same_owner+0x340/0x340 [ 230.897111] cache_grow_begin+0x91/0x710 [ 230.901161] kmem_cache_alloc+0x689/0x760 [ 230.905298] getname_flags+0xd0/0x5a0 [ 230.909084] getname+0x19/0x20 [ 230.912259] do_sys_open+0x3a2/0x760 [ 230.915960] ? filp_open+0x80/0x80 [ 230.919493] ? syscall_slow_exit_work+0x500/0x500 [ 230.924331] __x64_sys_open+0x7e/0xc0 [ 230.928122] do_syscall_64+0x1b9/0x820 [ 230.932008] ? finish_task_switch+0x1d3/0x870 [ 230.936506] ? syscall_return_slowpath+0x5e0/0x5e0 [ 230.941428] ? syscall_return_slowpath+0x31d/0x5e0 [ 230.946353] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 230.951716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.956551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.961727] RIP: 0033:0x455a79 [ 230.964902] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.984172] RSP: 002b:00007fb520e08c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 230.991877] RAX: ffffffffffffffda RBX: 00007fb520e096d4 RCX: 0000000000455a79 [ 230.999136] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000180 [ 231.006404] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 11:48:18 executing program 6 (fault-call:3 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 231.013673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 231.020928] R13: 00000000004eb63f R14: 00000000004d0140 R15: 0000000000000001 [ 231.058434] FAULT_INJECTION: forcing a failure. [ 231.058434] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 231.070272] CPU: 0 PID: 14569 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 231.077624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.086987] Call Trace: [ 231.089568] dump_stack+0x1c9/0x2b4 [ 231.093191] ? dump_stack_print_info.cold.2+0x52/0x52 [ 231.098376] ? print_usage_bug+0xc0/0xc0 [ 231.102434] should_fail.cold.4+0xa/0x1a [ 231.106485] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.111570] ? __fdget_pos+0x1bb/0x200 [ 231.115460] ? graph_lock+0x170/0x170 [ 231.119260] ? trace_hardirqs_on+0x10/0x10 [ 231.123483] ? find_held_lock+0x36/0x1c0 [ 231.127534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.133063] ? _parse_integer+0x13b/0x190 [ 231.137211] ? graph_lock+0x170/0x170 [ 231.141018] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 231.146564] ? _kstrtoull+0x188/0x250 [ 231.150366] ? _parse_integer+0x190/0x190 [ 231.154503] ? lock_release+0xa30/0xa30 [ 231.158485] ? find_held_lock+0x36/0x1c0 [ 231.162552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.168101] ? should_fail+0x223/0xbed [ 231.171983] __alloc_pages_nodemask+0x36e/0xdb0 [ 231.176666] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 231.181684] ? find_held_lock+0x36/0x1c0 [ 231.185743] ? check_same_owner+0x340/0x340 [ 231.190067] cache_grow_begin+0x91/0x710 [ 231.194141] kmem_cache_alloc+0x689/0x760 [ 231.198284] ? __lock_is_held+0xb5/0x140 [ 231.202339] getname_flags+0xd0/0x5a0 [ 231.206134] user_path_at_empty+0x2d/0x50 [ 231.210271] path_setxattr+0xd6/0x230 [ 231.214069] ? setxattr+0x450/0x450 [ 231.217690] ? __ia32_sys_read+0xb0/0xb0 [ 231.221781] ? syscall_slow_exit_work+0x500/0x500 [ 231.226623] __x64_sys_setxattr+0xc4/0x150 [ 231.230845] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 231.235848] do_syscall_64+0x1b9/0x820 [ 231.239719] ? finish_task_switch+0x1d3/0x870 [ 231.244197] ? syscall_return_slowpath+0x5e0/0x5e0 [ 231.249117] ? syscall_return_slowpath+0x31d/0x5e0 [ 231.254057] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe 11:48:18 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:18 executing program 3 (fault-call:6 fault-nth:1): mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 231.259426] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.264284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.269475] RIP: 0033:0x455a79 [ 231.272661] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.291959] FAULT_INJECTION: forcing a failure. [ 231.291959] name failslab, interval 1, probability 0, space 0, times 0 [ 231.292014] RSP: 002b:00007fec46534c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 231.292032] RAX: ffffffffffffffda RBX: 00007fec465356d4 RCX: 0000000000455a79 [ 231.292041] RDX: 0000000020000280 RSI: 0000000020000240 RDI: 0000000020000180 [ 231.292049] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 231.292057] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000014 [ 231.292074] R13: 00000000004bbbe9 R14: 00000000004d3170 R15: 0000000000000001 [ 231.347296] CPU: 1 PID: 14578 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #143 [ 231.354661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.364027] Call Trace: [ 231.366623] dump_stack+0x1c9/0x2b4 [ 231.370245] ? dump_stack_print_info.cold.2+0x52/0x52 [ 231.375425] ? print_usage_bug+0xc0/0xc0 [ 231.379478] should_fail.cold.4+0xa/0x1a [ 231.383537] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.388653] ? graph_lock+0x170/0x170 [ 231.392464] ? find_held_lock+0x36/0x1c0 [ 231.396530] ? __lock_is_held+0xb5/0x140 [ 231.400601] ? check_same_owner+0x340/0x340 [ 231.404916] ? rcu_note_context_switch+0x730/0x730 [ 231.409835] __should_failslab+0x124/0x180 [ 231.414064] should_failslab+0x9/0x14 [ 231.417862] kmem_cache_alloc+0x2af/0x760 [ 231.422011] ? blk_start_plug+0xcc/0x370 [ 231.426075] ext4_init_io_end+0x96/0x220 [ 231.430133] ? ext4_end_io_rsv_work+0x920/0x920 [ 231.434798] ? __lock_is_held+0xb5/0x140 [ 231.438850] ? radix_tree_tagged+0x11/0x60 [ 231.443075] ext4_writepages+0x13f6/0x4080 [ 231.447304] ? ext4_mark_inode_dirty+0xb50/0xb50 [ 231.452046] ? kernel_text_address+0x70/0xf0 [ 231.456436] ? unwind_get_return_address+0x61/0xa0 [ 231.461362] ? __save_stack_trace+0x8d/0xf0 [ 231.465690] ? graph_lock+0x170/0x170 [ 231.469485] ? save_stack+0x43/0xd0 [ 231.473120] ? __kasan_slab_free+0x11a/0x170 [ 231.477515] ? kasan_slab_free+0xe/0x10 [ 231.481473] ? kmem_cache_free+0x86/0x2d0 [ 231.485625] ? jbd2_journal_stop+0x449/0x15c0 [ 231.490113] ? ext4_ioctl_setflags+0x528/0x7d0 [ 231.494678] ? ext4_ioctl+0xe41/0x4210 [ 231.498563] ? do_vfs_ioctl+0x1de/0x1720 [ 231.502612] ? ksys_ioctl+0xa9/0xd0 [ 231.506227] ? __x64_sys_ioctl+0x73/0xb0 [ 231.510284] ? find_held_lock+0x36/0x1c0 [ 231.514352] ? lock_downgrade+0x8f0/0x8f0 [ 231.518503] ? lock_downgrade+0x8f0/0x8f0 [ 231.522639] ? kasan_check_read+0x11/0x20 [ 231.526770] ? do_raw_spin_unlock+0xa7/0x2f0 [ 231.531170] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 231.535737] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 231.540144] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 231.545670] ? wbc_attach_and_unlock_inode+0x64b/0x9f0 [ 231.550949] ? ext4_mark_inode_dirty+0xb50/0xb50 [ 231.555694] do_writepages+0x9a/0x1a0 [ 231.559480] ? do_writepages+0x9a/0x1a0 [ 231.563465] __filemap_fdatawrite_range+0x364/0x4a0 [ 231.568490] ? delete_from_page_cache_batch+0xf90/0xf90 [ 231.573876] filemap_flush+0x23/0x30 [ 231.577601] ext4_alloc_da_blocks+0x3a5/0x4b0 [ 231.582100] ? do_journal_get_write_access+0x130/0x130 [ 231.587379] ? inode_init_owner+0x340/0x340 [ 231.591699] ext4_ind_migrate+0x5ad/0x6f0 [ 231.595839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.601363] ext4_ioctl_setflags+0x72e/0x7d0 [ 231.605761] ? ext4_ioc_getfsmap+0xed0/0xed0 [ 231.610153] ? down_read+0x1d0/0x1d0 [ 231.613850] ? __mnt_want_write_file+0x87/0xc0 [ 231.618428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.624009] ext4_ioctl+0xe41/0x4210 [ 231.627727] ? find_held_lock+0x36/0x1c0 [ 231.631780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.637304] ? ext4_ioctl_group_add+0x560/0x560 [ 231.641964] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 231.647507] ? _kstrtoull+0x188/0x250 [ 231.651311] ? _parse_integer+0x190/0x190 [ 231.655460] ? graph_lock+0x170/0x170 [ 231.659253] ? lock_release+0xa30/0xa30 [ 231.663236] ? find_held_lock+0x36/0x1c0 [ 231.667302] ? find_held_lock+0x36/0x1c0 [ 231.671360] ? lock_downgrade+0x8f0/0x8f0 [ 231.675504] ? kasan_check_read+0x11/0x20 [ 231.679642] ? rcu_is_watching+0x8c/0x150 [ 231.683771] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 231.688163] ? __fget+0x414/0x670 [ 231.691613] ? match_held_lock+0x821/0x8d0 [ 231.695848] ? expand_files.part.8+0x9c0/0x9c0 [ 231.700424] ? kasan_check_write+0x14/0x20 [ 231.704643] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 231.709579] ? ext4_ioctl_group_add+0x560/0x560 [ 231.714249] do_vfs_ioctl+0x1de/0x1720 [ 231.718127] ? __lock_is_held+0xb5/0x140 [ 231.722180] ? ioctl_preallocate+0x300/0x300 [ 231.726577] ? __fget_light+0x2f7/0x440 [ 231.730533] ? fget_raw+0x20/0x20 [ 231.733968] ? __sb_end_write+0xac/0xe0 [ 231.737927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 231.743446] ? fput+0x130/0x1a0 [ 231.746706] ? ksys_write+0x1ae/0x260 [ 231.750500] ? security_file_ioctl+0x94/0xc0 [ 231.754909] ksys_ioctl+0xa9/0xd0 [ 231.758354] __x64_sys_ioctl+0x73/0xb0 [ 231.762239] do_syscall_64+0x1b9/0x820 [ 231.766127] ? finish_task_switch+0x1d3/0x870 [ 231.770615] ? syscall_return_slowpath+0x5e0/0x5e0 [ 231.775526] ? syscall_return_slowpath+0x31d/0x5e0 [ 231.780454] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 231.785815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.790666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.795844] RIP: 0033:0x455a79 [ 231.799025] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.818263] RSP: 002b:00007fc7446d0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 231.825961] RAX: ffffffffffffffda RBX: 00007fc7446d16d4 RCX: 0000000000455a79 [ 231.833227] RDX: 0000000020000000 RSI: 0000000040086602 RDI: 0000000000000015 [ 231.840491] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 231.847748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 231.855012] R13: 00000000004bd3da R14: 00000000004cbc70 R15: 0000000000000001 11:48:19 executing program 4 (fault-call:4 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:19 executing program 1: 11:48:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:19 executing program 1: [ 231.946912] FAULT_INJECTION: forcing a failure. [ 231.946912] name failslab, interval 1, probability 0, space 0, times 0 [ 231.958261] CPU: 0 PID: 14592 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 231.965626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.974986] Call Trace: [ 231.977588] dump_stack+0x1c9/0x2b4 [ 231.981238] ? dump_stack_print_info.cold.2+0x52/0x52 [ 231.986453] should_fail.cold.4+0xa/0x1a [ 231.990537] ? fault_create_debugfs_attr+0x1f0/0x1f0 11:48:19 executing program 6 (fault-call:3 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:19 executing program 3 (fault-call:6 fault-nth:2): mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 231.995659] ? trace_hardirqs_on+0x10/0x10 [ 231.999908] ? print_usage_bug+0xc0/0xc0 [ 232.004004] ? find_held_lock+0x36/0x1c0 [ 232.008093] ? check_same_owner+0x340/0x340 [ 232.012430] ? rcu_note_context_switch+0x730/0x730 [ 232.017365] ? graph_lock+0x170/0x170 [ 232.021178] __should_failslab+0x124/0x180 [ 232.025425] should_failslab+0x9/0x14 [ 232.029240] kmem_cache_alloc+0x2af/0x760 [ 232.033412] ? trace_hardirqs_on+0x10/0x10 [ 232.037661] ? find_held_lock+0x36/0x1c0 [ 232.041741] get_empty_filp+0x12d/0x530 11:48:19 executing program 1: 11:48:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 232.045730] ? proc_nr_files+0x60/0x60 [ 232.049629] ? lock_downgrade+0x8f0/0x8f0 [ 232.053796] ? graph_lock+0x170/0x170 [ 232.057610] ? kasan_check_read+0x11/0x20 [ 232.061766] ? rcu_is_watching+0x8c/0x150 [ 232.066712] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 232.071138] path_openat+0x11e/0x4e10 [ 232.074961] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 232.079997] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 232.084765] ? find_held_lock+0x36/0x1c0 [ 232.088851] ? lock_downgrade+0x8f0/0x8f0 [ 232.093001] ? do_sys_open+0x3a2/0x760 [ 232.096905] ? kasan_check_read+0x11/0x20 [ 232.101063] ? do_raw_spin_unlock+0xa7/0x2f0 [ 232.105483] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 232.110077] ? __lock_is_held+0xb5/0x140 [ 232.114160] ? _raw_spin_unlock+0x22/0x30 [ 232.118318] ? __alloc_fd+0x34e/0x710 [ 232.122129] ? usercopy_warn+0x120/0x120 [ 232.126206] do_filp_open+0x255/0x380 [ 232.130018] ? may_open_dev+0x100/0x100 [ 232.133996] ? strncpy_from_user+0x3be/0x510 [ 232.138413] ? mpi_free.cold.1+0x19/0x19 [ 232.142480] ? get_unused_fd_flags+0x122/0x1a0 11:48:19 executing program 1: [ 232.147067] ? getname_flags+0x26e/0x5a0 [ 232.151132] do_sys_open+0x584/0x760 [ 232.154849] ? filp_open+0x80/0x80 [ 232.158395] ? syscall_slow_exit_work+0x500/0x500 [ 232.163248] __x64_sys_open+0x7e/0xc0 [ 232.167056] do_syscall_64+0x1b9/0x820 [ 232.170946] ? finish_task_switch+0x1d3/0x870 [ 232.175453] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.180391] ? syscall_return_slowpath+0x31d/0x5e0 [ 232.185331] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 232.190713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.195575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.200773] RIP: 0033:0x455a79 [ 232.203959] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.223297] RSP: 002b:00007fb520e08c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 232.231018] RAX: ffffffffffffffda RBX: 00007fb520e096d4 RCX: 0000000000455a79 [ 232.238298] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000180 11:48:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:19 executing program 1: [ 232.245574] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 232.252852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 232.260126] R13: 00000000004eb63f R14: 00000000004d0140 R15: 0000000000000002 [ 232.341723] FAULT_INJECTION: forcing a failure. [ 232.341723] name failslab, interval 1, probability 0, space 0, times 0 [ 232.353328] CPU: 0 PID: 14620 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 232.360698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.370056] Call Trace: [ 232.372658] dump_stack+0x1c9/0x2b4 [ 232.376306] ? dump_stack_print_info.cold.2+0x52/0x52 [ 232.381534] should_fail.cold.4+0xa/0x1a [ 232.385622] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.390747] ? __lock_acquire+0x7fc/0x5020 [ 232.395003] ? find_held_lock+0x36/0x1c0 [ 232.399070] ? graph_lock+0x170/0x170 [ 232.402875] ? find_held_lock+0x36/0x1c0 [ 232.406940] ? __lock_is_held+0xb5/0x140 [ 232.410998] ? check_same_owner+0x340/0x340 [ 232.415317] ? usercopy_warn+0x120/0x120 [ 232.419371] ? _raw_spin_unlock_irq+0x27/0x70 [ 232.423868] ? rcu_note_context_switch+0x730/0x730 [ 232.428802] __should_failslab+0x124/0x180 [ 232.433047] should_failslab+0x9/0x14 [ 232.436849] kmem_cache_alloc_node_trace+0x26f/0x770 [ 232.441941] ? strncpy_from_user+0x3be/0x510 [ 232.446344] __kmalloc_node+0x33/0x70 [ 232.450141] kvmalloc_node+0x65/0xf0 [ 232.453870] setxattr+0x1a3/0x450 [ 232.457325] ? vfs_setxattr+0x100/0x100 [ 232.461297] ? lock_acquire+0x1e4/0x540 [ 232.465259] ? mnt_want_write+0x3f/0xc0 [ 232.469238] ? __lock_is_held+0xb5/0x140 [ 232.473301] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.478822] ? __mnt_want_write+0x2f9/0x3e0 [ 232.483143] ? may_umount_tree+0x220/0x220 [ 232.487367] ? rcu_read_lock_sched_held+0x108/0x120 [ 232.492379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.497901] ? __sb_start_write+0x17f/0x300 [ 232.502235] path_setxattr+0x1e3/0x230 [ 232.506122] ? setxattr+0x450/0x450 [ 232.509736] __x64_sys_setxattr+0xc4/0x150 [ 232.513957] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 232.518972] do_syscall_64+0x1b9/0x820 [ 232.522844] ? finish_task_switch+0x1d3/0x870 [ 232.527340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.532254] ? syscall_return_slowpath+0x31d/0x5e0 [ 232.537187] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 232.542548] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.547392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.552581] RIP: 0033:0x455a79 [ 232.555755] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.575051] RSP: 002b:00007fec46534c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 232.582749] RAX: ffffffffffffffda RBX: 00007fec465356d4 RCX: 0000000000455a79 [ 232.590018] RDX: 0000000020000280 RSI: 0000000020000240 RDI: 0000000020000180 [ 232.597280] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 232.604539] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000014 [ 232.611800] R13: 00000000004bbbe9 R14: 00000000004d3170 R15: 0000000000000002 [ 232.707418] device bridge_slave_1 left promiscuous mode [ 232.713158] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.733914] device bridge_slave_0 left promiscuous mode [ 232.739575] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.778365] team0 (unregistering): Port device team_slave_1 removed [ 232.789311] team0 (unregistering): Port device team_slave_0 removed [ 232.801558] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 232.819866] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 232.860109] bond0 (unregistering): Released all slaves 11:48:20 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x30, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:20 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:48:20 executing program 4 (fault-call:4 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 233.037772] FAULT_INJECTION: forcing a failure. [ 233.037772] name failslab, interval 1, probability 0, space 0, times 0 [ 233.049294] CPU: 1 PID: 14637 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 233.056666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.066023] Call Trace: [ 233.068627] dump_stack+0x1c9/0x2b4 [ 233.072267] ? dump_stack_print_info.cold.2+0x52/0x52 [ 233.077471] ? print_usage_bug+0xc0/0xc0 [ 233.081548] should_fail.cold.4+0xa/0x1a [ 233.085609] ? print_usage_bug+0xc0/0xc0 [ 233.089674] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.094781] ? print_usage_bug+0xc0/0xc0 [ 233.098847] ? graph_lock+0x170/0x170 [ 233.102659] ? trace_hardirqs_on+0x10/0x10 [ 233.106907] ? __lock_acquire+0x7fc/0x5020 [ 233.111158] ? find_held_lock+0x36/0x1c0 [ 233.115238] ? __lock_is_held+0xb5/0x140 [ 233.119317] ? check_same_owner+0x340/0x340 [ 233.123646] ? __lock_acquire+0x7fc/0x5020 [ 233.127892] ? rcu_note_context_switch+0x730/0x730 [ 233.132830] ? kernel_poison_pages+0x136/0x220 [ 233.137428] __should_failslab+0x124/0x180 [ 233.141684] should_failslab+0x9/0x14 [ 233.145497] kmem_cache_alloc+0x2af/0x760 [ 233.149649] ? trace_hardirqs_on+0x10/0x10 [ 233.153898] __d_alloc+0xc8/0xd50 [ 233.157365] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 233.162389] ? __lock_acquire+0x7fc/0x5020 [ 233.166636] ? lock_downgrade+0x8f0/0x8f0 [ 233.170797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.176351] ? trace_hardirqs_on+0x10/0x10 [ 233.180600] ? __lock_acquire+0x7fc/0x5020 [ 233.184847] ? __follow_mount_rcu.isra.36.part.37+0x38e/0x890 [ 233.190739] ? graph_lock+0x170/0x170 [ 233.194547] ? print_usage_bug+0xc0/0xc0 [ 233.198623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.204173] d_alloc+0x96/0x380 [ 233.207477] ? __d_alloc+0xd50/0xd50 [ 233.211198] ? find_held_lock+0x36/0x1c0 [ 233.215270] d_alloc_parallel+0x15a/0x1ea0 [ 233.219511] ? lock_downgrade+0x8f0/0x8f0 [ 233.223659] ? trace_hardirqs_on+0x10/0x10 [ 233.227903] ? kasan_check_read+0x11/0x20 [ 233.232062] ? __d_lookup_rcu+0xaa0/0xaa0 [ 233.236224] ? __d_lookup+0x5bc/0x9e0 [ 233.240032] ? d_alloc_parallel+0x1ea0/0x1ea0 [ 233.244534] ? lock_release+0xa30/0xa30 [ 233.248516] ? mark_held_locks+0xc9/0x160 [ 233.252667] ? d_lookup+0x269/0x340 [ 233.256304] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 233.261323] ? d_lookup+0x221/0x340 [ 233.264956] ? __d_lookup+0x9e0/0x9e0 [ 233.268786] ? lock_acquire+0x1e4/0x540 [ 233.272766] ? path_openat+0x204c/0x4e10 [ 233.276843] lookup_open+0x54f/0x1b40 [ 233.280657] ? complete_walk+0x260/0x260 [ 233.284729] ? down_read+0xb5/0x1d0 [ 233.288364] ? path_openat+0x204c/0x4e10 [ 233.292430] ? __down_interruptible+0x700/0x700 [ 233.297117] ? __sb_end_write+0xac/0xe0 [ 233.301104] path_openat+0x207d/0x4e10 [ 233.305007] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 233.305064] IPVS: ftp: loaded support on port[0] = 21 [ 233.309763] ? find_held_lock+0x36/0x1c0 [ 233.309795] ? lock_downgrade+0x8f0/0x8f0 [ 233.309808] ? do_sys_open+0x3a2/0x760 [ 233.309829] ? kasan_check_read+0x11/0x20 [ 233.309844] ? do_raw_spin_unlock+0xa7/0x2f0 [ 233.335597] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 233.340185] ? __lock_is_held+0xb5/0x140 [ 233.344261] ? _raw_spin_unlock+0x22/0x30 [ 233.348415] ? __alloc_fd+0x34e/0x710 [ 233.352309] ? usercopy_warn+0x120/0x120 [ 233.356404] do_filp_open+0x255/0x380 [ 233.360228] ? may_open_dev+0x100/0x100 [ 233.364206] ? strncpy_from_user+0x3be/0x510 [ 233.368624] ? mpi_free.cold.1+0x19/0x19 [ 233.372696] ? get_unused_fd_flags+0x122/0x1a0 [ 233.377288] ? getname_flags+0x26e/0x5a0 [ 233.381358] do_sys_open+0x584/0x760 [ 233.385086] ? filp_open+0x80/0x80 11:48:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:20 executing program 1: 11:48:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:20 executing program 6 (fault-call:3 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 233.388633] ? syscall_slow_exit_work+0x500/0x500 [ 233.393488] __x64_sys_open+0x7e/0xc0 [ 233.397298] do_syscall_64+0x1b9/0x820 [ 233.401189] ? finish_task_switch+0x1d3/0x870 [ 233.405692] ? syscall_return_slowpath+0x5e0/0x5e0 [ 233.410627] ? syscall_return_slowpath+0x31d/0x5e0 [ 233.415568] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 233.420944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.425800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.430987] RIP: 0033:0x455a79 11:48:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 233.434169] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.453522] RSP: 002b:00007fb520e08c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 233.461243] RAX: ffffffffffffffda RBX: 00007fb520e096d4 RCX: 0000000000455a79 [ 233.468533] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000180 [ 233.475809] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 11:48:20 executing program 1: [ 233.483084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 233.490362] R13: 00000000004eb63f R14: 00000000004d0140 R15: 0000000000000003 11:48:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:20 executing program 1: 11:48:20 executing program 1 (fault-call:7 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x39, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:21 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 234.366732] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.373167] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.393247] FAULT_INJECTION: forcing a failure. [ 234.393247] name failslab, interval 1, probability 0, space 0, times 0 [ 234.393762] device bridge_slave_0 entered promiscuous mode [ 234.404724] CPU: 1 PID: 14662 Comm: syz-executor6 Not tainted 4.18.0-rc4+ #143 [ 234.404738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.404747] Call Trace: [ 234.429642] dump_stack+0x1c9/0x2b4 [ 234.433276] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.438485] should_fail.cold.4+0xa/0x1a [ 234.442548] ? graph_lock+0x170/0x170 [ 234.446354] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.451466] ? graph_lock+0x170/0x170 [ 234.455273] ? print_usage_bug+0xc0/0xc0 [ 234.459335] ? find_held_lock+0x36/0x1c0 [ 234.463402] ? __lock_is_held+0xb5/0x140 [ 234.467474] ? check_same_owner+0x340/0x340 [ 234.471795] ? rcu_note_context_switch+0x730/0x730 [ 234.476728] __should_failslab+0x124/0x180 [ 234.480972] should_failslab+0x9/0x14 [ 234.484770] kmem_cache_alloc+0x2af/0x760 [ 234.488918] ? replenish_dl_entity.cold.53+0x37/0x37 [ 234.494033] __fuse_request_alloc+0x27/0xf0 [ 234.498366] __fuse_get_req+0x1f8/0xa20 [ 234.502346] ? fuse_put_request+0x360/0x360 [ 234.506665] ? kernel_text_address+0x79/0xf0 [ 234.511071] ? finish_wait+0x430/0x430 [ 234.514985] ? unwind_get_return_address+0x61/0xa0 [ 234.519916] fuse_simple_request+0x28/0x730 [ 234.524242] fuse_setxattr+0x3df/0x650 [ 234.528129] ? no_xattr_set+0x10/0x10 [ 234.531928] ? kvmalloc_node+0x65/0xf0 [ 234.535815] ? path_setxattr+0x1e3/0x230 [ 234.539875] ? graph_lock+0x170/0x170 [ 234.543687] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 234.548708] fuse_xattr_set+0x3b/0x70 [ 234.552516] ? fuse_removexattr+0x440/0x440 [ 234.553488] FAULT_INJECTION: forcing a failure. [ 234.553488] name failslab, interval 1, probability 0, space 0, times 0 [ 234.556837] __vfs_setxattr+0x124/0x190 [ 234.556857] ? xattr_resolve_name+0x430/0x430 [ 234.556887] __vfs_setxattr_noperm+0x11d/0x410 [ 234.581056] vfs_setxattr+0xd8/0x100 [ 234.584767] setxattr+0x2ea/0x450 [ 234.588217] ? vfs_setxattr+0x100/0x100 [ 234.592187] ? lock_acquire+0x1e4/0x540 [ 234.596152] ? mnt_want_write+0x3f/0xc0 [ 234.600123] ? __lock_is_held+0xb5/0x140 [ 234.604180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.609710] ? __mnt_want_write+0x2f9/0x3e0 [ 234.614026] ? may_umount_tree+0x220/0x220 [ 234.618257] ? rcu_read_lock_sched_held+0x108/0x120 [ 234.623269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.628796] ? __sb_start_write+0x17f/0x300 [ 234.633116] path_setxattr+0x1e3/0x230 [ 234.637013] ? setxattr+0x450/0x450 [ 234.640645] __x64_sys_setxattr+0xc4/0x150 [ 234.644870] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 234.649882] do_syscall_64+0x1b9/0x820 [ 234.653757] ? finish_task_switch+0x1d3/0x870 [ 234.658245] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.663167] ? syscall_return_slowpath+0x31d/0x5e0 [ 234.668096] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 234.673456] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.678300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.683477] RIP: 0033:0x455a79 [ 234.686654] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.705968] RSP: 002b:00007fec46534c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 234.713669] RAX: ffffffffffffffda RBX: 00007fec465356d4 RCX: 0000000000455a79 [ 234.720926] RDX: 0000000020000280 RSI: 0000000020000240 RDI: 0000000020000180 [ 234.728191] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 234.735447] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000014 [ 234.742704] R13: 00000000004bbbe9 R14: 00000000004d3170 R15: 0000000000000003 [ 234.749981] CPU: 0 PID: 14734 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #143 [ 234.757342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.766697] Call Trace: [ 234.769272] dump_stack+0x1c9/0x2b4 [ 234.772886] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.778068] should_fail.cold.4+0xa/0x1a [ 234.782114] ? lock_downgrade+0x8f0/0x8f0 [ 234.786263] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.791392] ? find_held_lock+0x36/0x1c0 [ 234.795480] ? find_held_lock+0x36/0x1c0 [ 234.799539] ? check_same_owner+0x340/0x340 [ 234.803847] ? rcu_note_context_switch+0x730/0x730 [ 234.808771] ? wait_for_completion+0x8d0/0x8d0 [ 234.813349] __should_failslab+0x124/0x180 [ 234.817580] should_failslab+0x9/0x14 [ 234.821375] kmem_cache_alloc+0x2af/0x760 [ 234.825515] getname_flags+0xd0/0x5a0 [ 234.829304] getname+0x19/0x20 [ 234.832481] do_sys_open+0x3a2/0x760 [ 234.836193] ? filp_open+0x80/0x80 [ 234.839720] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 234.845256] ? ksys_ioctl+0x81/0xd0 [ 234.849671] __x64_sys_open+0x7e/0xc0 [ 234.853458] do_syscall_64+0x1b9/0x820 [ 234.857332] ? finish_task_switch+0x1d3/0x870 [ 234.861820] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.866744] ? syscall_return_slowpath+0x31d/0x5e0 [ 234.871664] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 234.877018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.881856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.887030] RIP: 0033:0x455a79 [ 234.890200] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.909438] RSP: 002b:00007f5485fa5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 234.917138] RAX: ffffffffffffffda RBX: 00007f5485fa66d4 RCX: 0000000000455a79 [ 234.924393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 234.931678] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 234.938931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 234.946182] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000000 [ 234.985625] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.992094] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.000511] device bridge_slave_1 entered promiscuous mode [ 235.062967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.098730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 235.225863] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.268945] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.443229] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 235.450535] team0: Port device team_slave_0 added [ 235.474531] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 235.481657] team0: Port device team_slave_1 added [ 235.504631] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.529710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.554445] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 235.561542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.569962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.589691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 235.596774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.605144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.815892] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.822275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.828928] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.835319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.843521] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 235.961120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.624736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.700748] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.776259] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.782451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.789561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.862454] 8021q: adding VLAN 0 to HW filter on device team0 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:24 executing program 4 (fault-call:4 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:24 executing program 1 (fault-call:7 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:24 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:24 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x541b, &(0x7f0000000000)=r2) 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 237.360966] FAULT_INJECTION: forcing a failure. [ 237.360966] name failslab, interval 1, probability 0, space 0, times 0 [ 237.372521] CPU: 0 PID: 14966 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 237.379886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.389248] Call Trace: [ 237.391851] dump_stack+0x1c9/0x2b4 [ 237.395499] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.400697] ? check_same_owner+0x340/0x340 [ 237.405037] should_fail.cold.4+0xa/0x1a 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 237.409121] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.414231] ? __mutex_lock+0x7e8/0x1820 [ 237.418299] ? fuse_lock_inode+0xaf/0xe0 [ 237.422373] ? graph_lock+0x170/0x170 [ 237.426199] ? find_held_lock+0x36/0x1c0 [ 237.430278] ? __lock_is_held+0xb5/0x140 [ 237.434362] ? check_same_owner+0x340/0x340 [ 237.438697] ? rcu_note_context_switch+0x730/0x730 [ 237.443634] ? d_alloc_parallel+0x833/0x1ea0 [ 237.448052] __should_failslab+0x124/0x180 [ 237.452290] should_failslab+0x9/0x14 [ 237.456104] kmem_cache_alloc_trace+0x2cb/0x780 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 237.460786] ? trace_hardirqs_on+0x10/0x10 [ 237.465042] fuse_alloc_forget+0x3d/0x50 [ 237.469115] fuse_lookup_name+0x1b1/0x830 [ 237.473274] ? fuse_valid_type+0xb0/0xb0 [ 237.477358] fuse_lookup+0xf9/0x4c0 [ 237.480996] ? fuse_lookup_name+0x830/0x830 [ 237.485321] ? d_lookup+0x269/0x340 [ 237.488959] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 237.493984] ? d_lookup+0x221/0x340 [ 237.497623] ? __d_lookup+0x9e0/0x9e0 [ 237.501437] ? lock_acquire+0x1e4/0x540 [ 237.505417] ? path_openat+0x204c/0x4e10 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 237.509484] ? fuse_lookup_name+0x830/0x830 [ 237.513809] lookup_open+0x71d/0x1b40 [ 237.517629] ? complete_walk+0x260/0x260 [ 237.521704] ? down_read+0xb5/0x1d0 [ 237.525337] ? path_openat+0x204c/0x4e10 [ 237.529407] ? __down_interruptible+0x700/0x700 [ 237.534095] ? __sb_end_write+0xac/0xe0 [ 237.538078] path_openat+0x207d/0x4e10 [ 237.541976] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 237.546741] ? find_held_lock+0x36/0x1c0 [ 237.550817] ? lock_downgrade+0x8f0/0x8f0 [ 237.554993] ? do_sys_open+0x3a2/0x760 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 237.558892] ? kasan_check_read+0x11/0x20 [ 237.563051] ? do_raw_spin_unlock+0xa7/0x2f0 [ 237.567458] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 237.572043] ? __lock_is_held+0xb5/0x140 [ 237.576263] ? _raw_spin_unlock+0x22/0x30 [ 237.580420] ? __alloc_fd+0x34e/0x710 [ 237.584228] ? usercopy_warn+0x120/0x120 [ 237.588304] do_filp_open+0x255/0x380 [ 237.592115] ? may_open_dev+0x100/0x100 [ 237.596090] ? strncpy_from_user+0x3be/0x510 [ 237.600507] ? mpi_free.cold.1+0x19/0x19 [ 237.604566] ? get_unused_fd_flags+0x122/0x1a0 11:48:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x36, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 237.609156] ? getname_flags+0x26e/0x5a0 [ 237.613230] do_sys_open+0x584/0x760 [ 237.616949] ? filp_open+0x80/0x80 [ 237.620497] ? ksys_mount+0xa8/0x140 [ 237.624217] __x64_sys_open+0x7e/0xc0 [ 237.628025] do_syscall_64+0x1b9/0x820 [ 237.631913] ? finish_task_switch+0x1d3/0x870 [ 237.636411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 237.641349] ? syscall_return_slowpath+0x31d/0x5e0 [ 237.646290] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 237.651673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.656530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.661718] RIP: 0033:0x455a79 [ 237.664900] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.684263] RSP: 002b:00007fb520e08c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 237.691961] RAX: ffffffffffffffda RBX: 00007fb520e096d4 RCX: 0000000000455a79 [ 237.699227] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000180 [ 237.706496] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 237.713753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 237.721019] R13: 00000000004eb63f R14: 00000000004d0140 R15: 0000000000000004 [ 237.875499] device bridge_slave_1 left promiscuous mode [ 237.881155] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.892600] device bridge_slave_0 left promiscuous mode [ 237.898213] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.941892] team0 (unregistering): Port device team_slave_1 removed [ 237.952153] team0 (unregistering): Port device team_slave_0 removed [ 237.964537] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 237.982214] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 238.016710] bond0 (unregistering): Released all slaves [ 238.142843] FAULT_INJECTION: forcing a failure. [ 238.142843] name failslab, interval 1, probability 0, space 0, times 0 [ 238.154223] CPU: 1 PID: 14998 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #143 [ 238.161578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.170921] Call Trace: [ 238.173511] dump_stack+0x1c9/0x2b4 [ 238.177138] ? dump_stack_print_info.cold.2+0x52/0x52 [ 238.182341] should_fail.cold.4+0xa/0x1a [ 238.186402] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.191520] ? trace_hardirqs_on+0x10/0x10 [ 238.195760] ? print_usage_bug+0xc0/0xc0 [ 238.199829] ? find_held_lock+0x36/0x1c0 [ 238.203913] ? check_same_owner+0x340/0x340 [ 238.208237] ? rcu_note_context_switch+0x730/0x730 [ 238.213172] ? graph_lock+0x170/0x170 [ 238.216978] __should_failslab+0x124/0x180 [ 238.221222] should_failslab+0x9/0x14 [ 238.225036] kmem_cache_alloc+0x2af/0x760 [ 238.229188] ? trace_hardirqs_on+0x10/0x10 [ 238.233429] ? find_held_lock+0x36/0x1c0 [ 238.237495] get_empty_filp+0x12d/0x530 11:48:25 executing program 4 (fault-call:4 fault-nth:5): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 238.241475] ? proc_nr_files+0x60/0x60 [ 238.245373] ? lock_downgrade+0x8f0/0x8f0 [ 238.249535] ? graph_lock+0x170/0x170 [ 238.253349] ? kasan_check_read+0x11/0x20 [ 238.257504] ? rcu_is_watching+0x8c/0x150 [ 238.261657] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 238.266074] path_openat+0x11e/0x4e10 [ 238.269897] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 238.274926] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 238.279690] ? find_held_lock+0x36/0x1c0 [ 238.283768] ? lock_downgrade+0x8f0/0x8f0 [ 238.287920] ? do_sys_open+0x3a2/0x760 [ 238.291815] ? kasan_check_read+0x11/0x20 [ 238.295963] ? do_raw_spin_unlock+0xa7/0x2f0 [ 238.300374] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 238.304960] ? __lock_is_held+0xb5/0x140 [ 238.309031] ? _raw_spin_unlock+0x22/0x30 [ 238.313178] ? __alloc_fd+0x34e/0x710 [ 238.316988] ? usercopy_warn+0x120/0x120 [ 238.321065] do_filp_open+0x255/0x380 [ 238.324871] ? may_open_dev+0x100/0x100 [ 238.328845] ? strncpy_from_user+0x3be/0x510 [ 238.333262] ? mpi_free.cold.1+0x19/0x19 [ 238.337329] ? get_unused_fd_flags+0x122/0x1a0 [ 238.341930] ? getname_flags+0x26e/0x5a0 [ 238.345998] do_sys_open+0x584/0x760 [ 238.349719] ? filp_open+0x80/0x80 [ 238.353266] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 238.358815] ? ksys_ioctl+0x81/0xd0 [ 238.362450] __x64_sys_open+0x7e/0xc0 [ 238.366255] do_syscall_64+0x1b9/0x820 [ 238.370141] ? finish_task_switch+0x1d3/0x870 [ 238.374640] ? syscall_return_slowpath+0x5e0/0x5e0 [ 238.379573] ? syscall_return_slowpath+0x31d/0x5e0 [ 238.384515] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 238.389888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.394741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.399925] RIP: 0033:0x455a79 [ 238.403104] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.422474] RSP: 002b:00007f5485fa5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 238.430196] RAX: ffffffffffffffda RBX: 00007f5485fa66d4 RCX: 0000000000455a79 [ 238.437644] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 238.444914] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 238.452180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 238.459444] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000001 11:48:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:25 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x4020940d, &(0x7f0000000000)=r2) [ 238.547430] FAULT_INJECTION: forcing a failure. [ 238.547430] name failslab, interval 1, probability 0, space 0, times 0 [ 238.558723] CPU: 0 PID: 15022 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 238.566091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.575453] Call Trace: [ 238.578049] dump_stack+0x1c9/0x2b4 [ 238.581689] ? dump_stack_print_info.cold.2+0x52/0x52 [ 238.586895] ? check_same_owner+0x340/0x340 [ 238.591235] should_fail.cold.4+0xa/0x1a [ 238.595314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 238.600424] ? __mutex_lock+0x7e8/0x1820 [ 238.604494] ? fuse_lock_inode+0xaf/0xe0 [ 238.608566] ? graph_lock+0x170/0x170 [ 238.612387] ? find_held_lock+0x36/0x1c0 [ 238.616461] ? __lock_is_held+0xb5/0x140 [ 238.620541] ? check_same_owner+0x340/0x340 [ 238.624865] ? rcu_note_context_switch+0x730/0x730 [ 238.629800] ? d_alloc_parallel+0x833/0x1ea0 [ 238.634215] __should_failslab+0x124/0x180 [ 238.638457] should_failslab+0x9/0x14 [ 238.642258] kmem_cache_alloc_trace+0x2cb/0x780 [ 238.646932] ? trace_hardirqs_on+0x10/0x10 [ 238.651182] fuse_alloc_forget+0x3d/0x50 [ 238.655248] fuse_lookup_name+0x1b1/0x830 [ 238.659402] ? fuse_valid_type+0xb0/0xb0 [ 238.663481] fuse_lookup+0xf9/0x4c0 [ 238.667115] ? fuse_lookup_name+0x830/0x830 [ 238.671445] ? d_lookup+0x269/0x340 [ 238.675096] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 238.680116] ? d_lookup+0x221/0x340 [ 238.683770] ? __d_lookup+0x9e0/0x9e0 [ 238.687581] ? lock_acquire+0x1e4/0x540 [ 238.691560] ? path_openat+0x204c/0x4e10 [ 238.695625] ? fuse_lookup_name+0x830/0x830 [ 238.699953] lookup_open+0x71d/0x1b40 [ 238.703764] ? complete_walk+0x260/0x260 [ 238.707832] ? down_read+0xb5/0x1d0 [ 238.711462] ? path_openat+0x204c/0x4e10 [ 238.715524] ? __down_interruptible+0x700/0x700 [ 238.720203] ? __sb_end_write+0xac/0xe0 [ 238.724186] path_openat+0x207d/0x4e10 [ 238.728095] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 238.732859] ? find_held_lock+0x36/0x1c0 [ 238.736937] ? lock_downgrade+0x8f0/0x8f0 [ 238.741088] ? do_sys_open+0x3a2/0x760 [ 238.744983] ? kasan_check_read+0x11/0x20 [ 238.749130] ? do_raw_spin_unlock+0xa7/0x2f0 [ 238.753540] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 238.758124] ? __lock_is_held+0xb5/0x140 [ 238.762195] ? _raw_spin_unlock+0x22/0x30 [ 238.766343] ? __alloc_fd+0x34e/0x710 [ 238.770155] ? usercopy_warn+0x120/0x120 [ 238.774235] do_filp_open+0x255/0x380 [ 238.778035] ? may_open_dev+0x100/0x100 [ 238.782011] ? strncpy_from_user+0x3be/0x510 [ 238.786425] ? mpi_free.cold.1+0x19/0x19 [ 238.790486] ? get_unused_fd_flags+0x122/0x1a0 [ 238.795078] ? getname_flags+0x26e/0x5a0 [ 238.799144] do_sys_open+0x584/0x760 [ 238.802860] ? filp_open+0x80/0x80 [ 238.806409] ? ksys_mount+0xa8/0x140 [ 238.810127] __x64_sys_open+0x7e/0xc0 [ 238.813933] do_syscall_64+0x1b9/0x820 [ 238.817822] ? finish_task_switch+0x1d3/0x870 [ 238.822322] ? syscall_return_slowpath+0x5e0/0x5e0 [ 238.827254] ? syscall_return_slowpath+0x31d/0x5e0 [ 238.832194] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 238.837560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.842415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.847606] RIP: 0033:0x455a79 [ 238.850787] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.870170] RSP: 002b:00007fb520e08c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 238.884577] RAX: ffffffffffffffda RBX: 00007fb520e096d4 RCX: 0000000000455a79 [ 238.891850] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000180 11:48:25 executing program 1 (fault-call:7 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x0, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:25 executing program 6: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x84080, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0xb0, r1, 0xefdcfcc13fe19da2, 0x70bd27, 0x25dfdbfe, {0x8}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd1e}]}, 0xb0}, 0x1}, 0x4000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034020030725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r2, &(0x7f0000001000), 0xc84) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:25 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3b, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 238.899125] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 238.906428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 238.913701] R13: 00000000004eb63f R14: 00000000004d0140 R15: 0000000000000005 11:48:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$peek(0x1, r1, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 239.069008] IPVS: ftp: loaded support on port[0] = 21 11:48:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:26 executing program 4 (fault-call:4 fault-nth:6): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:48:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 239.771334] FAULT_INJECTION: forcing a failure. [ 239.771334] name failslab, interval 1, probability 0, space 0, times 0 [ 239.782656] CPU: 1 PID: 15106 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #143 [ 239.790022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.799377] Call Trace: [ 239.801977] dump_stack+0x1c9/0x2b4 [ 239.805612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 239.810825] should_fail.cold.4+0xa/0x1a [ 239.814905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 239.820022] ? __lock_acquire+0x7fc/0x5020 [ 239.824268] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 239.828697] ? find_held_lock+0x36/0x1c0 [ 239.832781] ? check_same_owner+0x340/0x340 [ 239.837114] ? rcu_note_context_switch+0x730/0x730 [ 239.842048] ? find_held_lock+0x36/0x1c0 [ 239.846121] __should_failslab+0x124/0x180 [ 239.850364] should_failslab+0x9/0x14 [ 239.854168] kmem_cache_alloc_trace+0x2cb/0x780 [ 239.858848] ? graph_lock+0x170/0x170 [ 239.862669] fuse_file_alloc+0xb2/0x3a0 [ 239.866658] ? fuse_writepage_end+0x610/0x610 [ 239.871162] ? find_held_lock+0x36/0x1c0 [ 239.875241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.880789] ? fsnotify+0xbb4/0x14e0 [ 239.884519] fuse_do_open+0xa9/0x540 [ 239.888239] ? fsnotify_first_mark+0x350/0x350 [ 239.892833] ? fuse_file_alloc+0x3a0/0x3a0 [ 239.897074] ? fsnotify+0x14e0/0x14e0 [ 239.900880] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 239.905481] fuse_open_common+0x160/0x2b0 [ 239.909637] fuse_dir_open+0x22/0x30 [ 239.913361] do_dentry_open+0x818/0xe40 [ 239.917340] ? security_inode_permission+0xd2/0x100 [ 239.922365] ? fuse_dir_release+0x20/0x20 [ 239.926528] vfs_open+0x139/0x230 [ 239.930014] path_openat+0x174a/0x4e10 [ 239.933929] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 239.938698] ? find_held_lock+0x36/0x1c0 [ 239.942780] ? lock_downgrade+0x8f0/0x8f0 [ 239.946928] ? do_sys_open+0x3a2/0x760 [ 239.950831] ? kasan_check_read+0x11/0x20 [ 239.954982] ? do_raw_spin_unlock+0xa7/0x2f0 [ 239.959395] ? __lock_is_held+0xb5/0x140 [ 239.963476] ? _raw_spin_unlock+0x22/0x30 [ 239.967630] ? __alloc_fd+0x34e/0x710 [ 239.970235] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.971432] ? usercopy_warn+0x120/0x120 [ 239.971465] do_filp_open+0x255/0x380 [ 239.971483] ? may_open_dev+0x100/0x100 [ 239.971500] ? strncpy_from_user+0x3be/0x510 [ 239.977849] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.981855] ? mpi_free.cold.1+0x19/0x19 [ 239.981873] ? get_unused_fd_flags+0x122/0x1a0 [ 239.981896] ? getname_flags+0x26e/0x5a0 [ 240.001490] device bridge_slave_0 entered promiscuous mode [ 240.004362] do_sys_open+0x584/0x760 [ 240.004381] ? filp_open+0x80/0x80 [ 240.004401] ? syscall_slow_exit_work+0x500/0x500 [ 240.004414] ? ksys_ioctl+0x81/0xd0 [ 240.004430] __x64_sys_open+0x7e/0xc0 [ 240.038091] do_syscall_64+0x1b9/0x820 [ 240.041977] ? finish_task_switch+0x1d3/0x870 [ 240.046472] ? syscall_return_slowpath+0x5e0/0x5e0 [ 240.051406] ? syscall_return_slowpath+0x31d/0x5e0 [ 240.056349] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 240.061722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.066577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.071761] RIP: 0033:0x455a79 [ 240.074938] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.094313] RSP: 002b:00007f5485fa5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 240.102031] RAX: ffffffffffffffda RBX: 00007f5485fa66d4 RCX: 0000000000455a79 [ 240.109307] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 240.116586] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 240.120840] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.123853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 240.123863] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000002 [ 240.144960] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.153213] device bridge_slave_1 entered promiscuous mode [ 240.207167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 240.260194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 240.294206] FAULT_INJECTION: forcing a failure. [ 240.294206] name failslab, interval 1, probability 0, space 0, times 0 [ 240.305533] CPU: 1 PID: 15083 Comm: syz-executor4 Not tainted 4.18.0-rc4+ #143 [ 240.312900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.322256] Call Trace: [ 240.324842] dump_stack+0x1c9/0x2b4 [ 240.328460] ? dump_stack_print_info.cold.2+0x52/0x52 [ 240.333653] should_fail.cold.4+0xa/0x1a [ 240.337701] ? graph_lock+0x170/0x170 [ 240.341489] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 240.346581] ? graph_lock+0x170/0x170 [ 240.350380] ? print_usage_bug+0xc0/0xc0 [ 240.354437] ? find_held_lock+0x36/0x1c0 [ 240.358489] ? __lock_is_held+0xb5/0x140 [ 240.362549] ? check_same_owner+0x340/0x340 [ 240.366855] ? rcu_note_context_switch+0x730/0x730 [ 240.371782] __should_failslab+0x124/0x180 [ 240.376003] should_failslab+0x9/0x14 [ 240.379794] kmem_cache_alloc+0x2af/0x760 [ 240.383927] ? graph_lock+0x170/0x170 [ 240.387711] ? replenish_dl_entity.cold.53+0x37/0x37 [ 240.392813] __fuse_request_alloc+0x27/0xf0 [ 240.397128] __fuse_get_req+0x1f8/0xa20 [ 240.401093] ? fuse_put_request+0x360/0x360 [ 240.405401] ? finish_wait+0x430/0x430 [ 240.409274] ? do_raw_spin_unlock+0xa7/0x2f0 [ 240.413666] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 240.418233] fuse_simple_request+0x28/0x730 [ 240.422544] fuse_lookup_name+0x3ee/0x830 [ 240.426680] ? fuse_valid_type+0xb0/0xb0 [ 240.430738] fuse_lookup+0xf9/0x4c0 [ 240.434351] ? fuse_lookup_name+0x830/0x830 [ 240.438662] ? d_lookup+0x269/0x340 [ 240.442285] ? lock_acquire+0x1e4/0x540 [ 240.446262] ? path_openat+0x204c/0x4e10 [ 240.450306] ? fuse_lookup_name+0x830/0x830 [ 240.454615] lookup_open+0x71d/0x1b40 [ 240.458407] ? complete_walk+0x260/0x260 [ 240.462457] ? down_read+0xb5/0x1d0 [ 240.466069] ? path_openat+0x204c/0x4e10 [ 240.470125] ? __down_interruptible+0x700/0x700 [ 240.474787] ? __sb_end_write+0xac/0xe0 [ 240.478747] path_openat+0x207d/0x4e10 [ 240.482628] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 240.487370] ? find_held_lock+0x36/0x1c0 [ 240.491421] ? lock_downgrade+0x8f0/0x8f0 [ 240.495563] ? do_sys_open+0x3a2/0x760 [ 240.499441] ? kasan_check_read+0x11/0x20 [ 240.503571] ? do_raw_spin_unlock+0xa7/0x2f0 [ 240.507961] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 240.512538] ? __lock_is_held+0xb5/0x140 [ 240.516591] ? _raw_spin_unlock+0x22/0x30 [ 240.520724] ? __alloc_fd+0x34e/0x710 [ 240.524509] ? usercopy_warn+0x120/0x120 [ 240.528563] do_filp_open+0x255/0x380 [ 240.532349] ? may_open_dev+0x100/0x100 [ 240.536315] ? strncpy_from_user+0x3be/0x510 [ 240.540712] ? mpi_free.cold.1+0x19/0x19 [ 240.544760] ? get_unused_fd_flags+0x122/0x1a0 [ 240.549327] ? getname_flags+0x26e/0x5a0 [ 240.553374] do_sys_open+0x584/0x760 [ 240.557075] ? filp_open+0x80/0x80 [ 240.560603] ? syscall_slow_exit_work+0x500/0x500 [ 240.565431] __x64_sys_open+0x7e/0xc0 [ 240.569218] do_syscall_64+0x1b9/0x820 [ 240.573086] ? finish_task_switch+0x1d3/0x870 [ 240.577566] ? syscall_return_slowpath+0x5e0/0x5e0 [ 240.582491] ? syscall_return_slowpath+0x31d/0x5e0 [ 240.587412] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 240.592773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 240.597603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.602777] RIP: 0033:0x455a79 [ 240.605947] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.625193] RSP: 002b:00007fb520e08c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 240.632979] RAX: ffffffffffffffda RBX: 00007fb520e096d4 RCX: 0000000000455a79 [ 240.640231] RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000020000180 [ 240.647490] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 240.654741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 240.661994] R13: 00000000004eb63f R14: 00000000004d0140 R15: 0000000000000006 [ 240.737493] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.780140] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.923514] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.931207] team0: Port device team_slave_0 added [ 240.953431] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.960540] team0: Port device team_slave_1 added [ 240.983985] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.009941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.034624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 241.041718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.050165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.069621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.076689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.085069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.298202] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.304572] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.311217] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.317564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.324782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.097469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.175808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 242.209270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.256912] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 242.263122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.270874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.340933] 8021q: adding VLAN 0 to HW filter on device team0 11:48:29 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x4030582a, &(0x7f0000000000)=r2) 11:48:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:29 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x0, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080)=0x20, 0x4) read$FUSE(r0, &(0x7f0000001000), 0xfffffffffffffdde) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x8000}}, 0x50) 11:48:29 executing program 1 (fault-call:7 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8}}, 0x90) 11:48:29 executing program 4 (fault-call:4 fault-nth:7): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:30 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40286608, &(0x7f0000000000)=r2) 11:48:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x20000044) 11:48:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) [ 242.931876] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 21 (only 16 groups) 11:48:30 executing program 2: r0 = dup(0xffffffffffffffff) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1, r2}) r3 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x100000001) 11:48:30 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x400c6615, &(0x7f0000000000)=r2) [ 242.993202] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 21 (only 16 groups) 11:48:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0xfffffffffffffe0c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x80000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap='cache=mmap', 0x2c}, {@msize={'msize', 0x3d, 0x3}, 0x2c}, {@aname={'aname', 0x3d}, 0x2c}, {@cache_fscache='cache=fscache', 0x2c}, {@dfltuid={'dfltuid', 0x3d, r2}, 0x2c}, {@cache_fscache='cache=fscache', 0x2c}, {@fscache='fscache', 0x2c}]}}) 11:48:30 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40305828, &(0x7f0000000000)=r2) 11:48:30 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0xc028660f, &(0x7f0000000000)=r2) 11:48:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 243.628457] FAULT_INJECTION: forcing a failure. [ 243.628457] name failslab, interval 1, probability 0, space 0, times 0 [ 243.639770] CPU: 0 PID: 15408 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #143 [ 243.647134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.656498] Call Trace: [ 243.659081] dump_stack+0x1c9/0x2b4 [ 243.662706] ? dump_stack_print_info.cold.2+0x52/0x52 [ 243.667889] should_fail.cold.4+0xa/0x1a [ 243.671938] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 243.677035] ? __lock_acquire+0x7fc/0x5020 [ 243.681252] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 243.685652] ? find_held_lock+0x36/0x1c0 [ 243.689716] ? check_same_owner+0x340/0x340 [ 243.694033] ? rcu_note_context_switch+0x730/0x730 [ 243.698944] ? find_held_lock+0x36/0x1c0 [ 243.702994] __should_failslab+0x124/0x180 [ 243.707221] should_failslab+0x9/0x14 [ 243.711006] kmem_cache_alloc_trace+0x2cb/0x780 [ 243.715664] ? graph_lock+0x170/0x170 [ 243.719456] fuse_file_alloc+0xb2/0x3a0 [ 243.723437] ? fuse_writepage_end+0x610/0x610 [ 243.727930] ? find_held_lock+0x36/0x1c0 [ 243.731979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.737506] ? fsnotify+0xbb4/0x14e0 [ 243.741212] fuse_do_open+0xa9/0x540 [ 243.744913] ? fsnotify_first_mark+0x350/0x350 [ 243.749497] ? fuse_file_alloc+0x3a0/0x3a0 [ 243.753716] ? fsnotify+0x14e0/0x14e0 [ 243.757505] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 243.762090] fuse_open_common+0x160/0x2b0 [ 243.766228] fuse_dir_open+0x22/0x30 [ 243.769940] do_dentry_open+0x818/0xe40 [ 243.773900] ? security_inode_permission+0xd2/0x100 [ 243.778900] ? fuse_dir_release+0x20/0x20 [ 243.783037] vfs_open+0x139/0x230 [ 243.786480] path_openat+0x174a/0x4e10 [ 243.790365] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 243.795112] ? find_held_lock+0x36/0x1c0 [ 243.799254] ? lock_downgrade+0x8f0/0x8f0 [ 243.803387] ? do_sys_open+0x3a2/0x760 [ 243.807261] ? kasan_check_read+0x11/0x20 [ 243.811391] ? do_raw_spin_unlock+0xa7/0x2f0 [ 243.815782] ? __lock_is_held+0xb5/0x140 [ 243.819834] ? _raw_spin_unlock+0x22/0x30 [ 243.823962] ? __alloc_fd+0x34e/0x710 [ 243.827748] ? usercopy_warn+0x120/0x120 [ 243.831799] do_filp_open+0x255/0x380 [ 243.835588] ? may_open_dev+0x100/0x100 [ 243.839547] ? strncpy_from_user+0x3be/0x510 [ 243.843942] ? mpi_free.cold.1+0x19/0x19 [ 243.847990] ? get_unused_fd_flags+0x122/0x1a0 [ 243.852559] ? getname_flags+0x26e/0x5a0 [ 243.856611] do_sys_open+0x584/0x760 [ 243.860312] ? filp_open+0x80/0x80 [ 243.863838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 243.869359] ? ksys_ioctl+0x81/0xd0 [ 243.872969] __x64_sys_open+0x7e/0xc0 [ 243.876754] do_syscall_64+0x1b9/0x820 [ 243.880636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 243.885551] ? syscall_return_slowpath+0x31d/0x5e0 [ 243.890469] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 243.895821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.900653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.905823] RIP: 0033:0x455a79 [ 243.908989] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.928234] RSP: 002b:00007f5485fa5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 243.935925] RAX: ffffffffffffffda RBX: 00007f5485fa66d4 RCX: 0000000000455a79 [ 243.943177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 243.950601] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 243.957853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 243.965105] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000003 11:48:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x96) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000080)) getsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000100)=0x6) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 11:48:31 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004587d, &(0x7f0000000000)=r2) 11:48:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x0, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:31 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) 11:48:31 executing program 1 (fault-call:7 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0100907f17ae55cfcc29488e0d00", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = memfd_create(&(0x7f0000000040)='system.posix_acl_access\x00', 0x1) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:31 executing program 0: 11:48:31 executing program 6: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101000, 0x0) getsockopt$llc_int(r1, 0x10c, 0x8, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x10) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000340)=r0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r2, &(0x7f0000001000), 0xc84) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000380)={0x30, 0x5, 0x0, {0x0, 0x4, 0x100, 0x6}}, 0x30) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x2}, 0x10) 11:48:31 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086608, &(0x7f0000000000)=r2) 11:48:31 executing program 0: 11:48:31 executing program 2: socket$inet6(0xa, 0x2, 0x0) 11:48:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000002c0)={{0x2, 0x4e23, @multicast1=0xe0000001}, {0x7, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}}, 0x20, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 'bond_slave_1\x00'}) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="f856d50cd2de336bedb01378510a7876f195ea28eee7e2fad162ff7e59b1407942990b1b05ec4d07489d049dfc33d2a73550621063a2353bf13d5020df81f27706c04644f530aac2cd62b0c22b9ccf0ba4187e33988769c7522a0ffe31391aab3f17f07a0b434ca870bb5f508c76665cba1d3f7ac61771b8e97c755ec1e0b041e8595f7902dc07ed9deb15792924955104e9d557cb52b988eb5602e43461ca3364e288", 0xa3}], 0x1, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:31 executing program 0: 11:48:31 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x5421, &(0x7f0000000000)=r2) [ 244.980321] FAULT_INJECTION: forcing a failure. [ 244.980321] name failslab, interval 1, probability 0, space 0, times 0 [ 244.991617] CPU: 1 PID: 15480 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #143 [ 244.998974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.008327] Call Trace: [ 245.010915] dump_stack+0x1c9/0x2b4 [ 245.014535] ? dump_stack_print_info.cold.2+0x52/0x52 [ 245.019713] ? __kernel_text_address+0xd/0x40 [ 245.024201] should_fail.cold.4+0xa/0x1a [ 245.028252] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.033343] ? save_stack+0xa9/0xd0 [ 245.036964] ? save_stack+0x43/0xd0 [ 245.040580] ? kasan_kmalloc+0xc4/0xe0 [ 245.044453] ? kmem_cache_alloc_trace+0x152/0x780 [ 245.049278] ? fuse_file_alloc+0xb2/0x3a0 [ 245.053407] ? fuse_do_open+0xa9/0x540 [ 245.057279] ? fuse_open_common+0x160/0x2b0 [ 245.061592] ? find_held_lock+0x36/0x1c0 [ 245.065650] ? check_same_owner+0x340/0x340 [ 245.069961] ? rcu_note_context_switch+0x730/0x730 [ 245.074883] ? kasan_check_read+0x11/0x20 [ 245.079024] __should_failslab+0x124/0x180 [ 245.083252] should_failslab+0x9/0x14 [ 245.087041] kmem_cache_alloc+0x2af/0x760 [ 245.091176] ? fuse_file_alloc+0xb2/0x3a0 [ 245.095371] ? rcu_read_lock_sched_held+0x108/0x120 [ 245.100377] ? kmem_cache_alloc_trace+0x616/0x780 [ 245.105207] __fuse_request_alloc+0x27/0xf0 [ 245.109519] fuse_request_alloc+0x18/0x20 [ 245.113657] fuse_file_alloc+0xe8/0x3a0 [ 245.117616] ? fuse_writepage_end+0x610/0x610 [ 245.122099] ? find_held_lock+0x36/0x1c0 [ 245.126159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.131679] ? fsnotify+0xbb4/0x14e0 [ 245.135397] fuse_do_open+0xa9/0x540 [ 245.139096] ? fsnotify_first_mark+0x350/0x350 [ 245.143665] ? fuse_file_alloc+0x3a0/0x3a0 [ 245.147885] ? fsnotify+0x14e0/0x14e0 [ 245.151672] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 245.156241] fuse_open_common+0x160/0x2b0 [ 245.160376] fuse_dir_open+0x22/0x30 [ 245.164077] do_dentry_open+0x818/0xe40 [ 245.168038] ? security_inode_permission+0xd2/0x100 [ 245.173037] ? fuse_dir_release+0x20/0x20 [ 245.177172] vfs_open+0x139/0x230 [ 245.180614] path_openat+0x174a/0x4e10 [ 245.184496] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 245.189242] ? find_held_lock+0x36/0x1c0 [ 245.193294] ? lock_downgrade+0x8f0/0x8f0 [ 245.197427] ? do_sys_open+0x3a2/0x760 [ 245.201305] ? kasan_check_read+0x11/0x20 [ 245.205439] ? do_raw_spin_unlock+0xa7/0x2f0 [ 245.209833] ? __lock_is_held+0xb5/0x140 [ 245.213885] ? _raw_spin_unlock+0x22/0x30 [ 245.218020] ? __alloc_fd+0x34e/0x710 [ 245.221805] ? usercopy_warn+0x120/0x120 [ 245.225866] do_filp_open+0x255/0x380 [ 245.229650] ? may_open_dev+0x100/0x100 [ 245.233606] ? strncpy_from_user+0x3be/0x510 [ 245.238000] ? mpi_free.cold.1+0x19/0x19 [ 245.242069] ? get_unused_fd_flags+0x122/0x1a0 [ 245.246636] ? getname_flags+0x26e/0x5a0 [ 245.250682] do_sys_open+0x584/0x760 [ 245.254380] ? filp_open+0x80/0x80 [ 245.257904] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 245.263425] ? ksys_ioctl+0x81/0xd0 [ 245.267037] __x64_sys_open+0x7e/0xc0 [ 245.270825] do_syscall_64+0x1b9/0x820 [ 245.274704] ? finish_task_switch+0x1d3/0x870 [ 245.279186] ? syscall_return_slowpath+0x5e0/0x5e0 [ 245.284100] ? syscall_return_slowpath+0x31d/0x5e0 [ 245.289023] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 245.294374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.299215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.304387] RIP: 0033:0x455a79 [ 245.307559] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:48:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x2302, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:32 executing program 0: 11:48:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000100)) [ 245.326789] RSP: 002b:00007f5485fa5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 245.334481] RAX: ffffffffffffffda RBX: 00007f5485fa66d4 RCX: 0000000000455a79 [ 245.341734] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 245.348985] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 245.356240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 245.363492] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000004 11:48:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x68, 0x0, 0x2, [{0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x68) 11:48:32 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:32 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x2, &(0x7f0000000000)=r2) 11:48:32 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6c77726f75f868d07e0300001000000000705f69643d", @ANYRESDEC=0x0, @ANYBLOB="1900"]) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x23c9, 0x10000, 0x8000, 0x3, 0xfa4, 0x3}}, 0x50) 11:48:32 executing program 0: 11:48:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100)) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:32 executing program 1 (fault-call:7 fault-nth:5): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:32 executing program 0: 11:48:32 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x5450, &(0x7f0000000000)=r2) 11:48:32 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7d, 0x20440) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000080)) 11:48:32 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000100)={[{0x9, 0x7f, 0xffff, 0xfff, 0x200, 0xff, 0xffffffffffffff81, 0x10001, 0x0, 0x20, 0x1, 0x37, 0x8001}, {0x9a6c, 0x5, 0x9b, 0x4, 0x2, 0x8, 0x6, 0x5, 0x100, 0x3, 0x20, 0x9, 0x3}, {0xfffffffffffffffd, 0x4, 0x401, 0xfffffffffffffffc, 0xea38, 0x4, 0x2, 0x1, 0x1, 0x4, 0x81, 0x1, 0xb39}], 0x7}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:32 executing program 0: 11:48:32 executing program 0: 11:48:33 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x6612, &(0x7f0000000000)=r2) 11:48:33 executing program 2: socket$inet6(0xa, 0x2, 0x0) 11:48:33 executing program 0: [ 246.412177] FAULT_INJECTION: forcing a failure. [ 246.412177] name failslab, interval 1, probability 0, space 0, times 0 [ 246.423496] CPU: 0 PID: 15550 Comm: syz-executor1 Not tainted 4.18.0-rc4+ #143 [ 246.430859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.440224] Call Trace: [ 246.442808] dump_stack+0x1c9/0x2b4 [ 246.446427] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.451608] should_fail.cold.4+0xa/0x1a [ 246.455656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.460749] ? __lock_acquire+0x7fc/0x5020 [ 246.464985] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 246.469386] ? kasan_check_read+0x11/0x20 [ 246.473528] ? find_held_lock+0x36/0x1c0 [ 246.477586] ? check_same_owner+0x340/0x340 [ 246.481904] ? kasan_kmalloc+0xc4/0xe0 [ 246.485789] ? kasan_slab_alloc+0x12/0x20 [ 246.489920] ? kmem_cache_alloc+0x12e/0x760 [ 246.494229] ? rcu_note_context_switch+0x730/0x730 [ 246.499140] ? fuse_do_open+0xa9/0x540 [ 246.503012] ? fuse_open_common+0x160/0x2b0 [ 246.507346] __should_failslab+0x124/0x180 [ 246.511572] should_failslab+0x9/0x14 [ 246.515372] kmem_cache_alloc+0x2af/0x760 [ 246.519509] ? graph_lock+0x170/0x170 [ 246.523302] __fuse_request_alloc+0x27/0xf0 [ 246.527608] __fuse_get_req+0x1f8/0xa20 [ 246.531570] ? find_held_lock+0x36/0x1c0 [ 246.535620] ? fuse_put_request+0x360/0x360 [ 246.539941] ? lock_downgrade+0x8f0/0x8f0 [ 246.544074] ? __lockdep_init_map+0x105/0x590 [ 246.548559] fuse_simple_request+0x28/0x730 [ 246.552893] fuse_send_open.isra.17+0x366/0x450 [ 246.557548] ? fuse_file_read_iter+0x250/0x250 [ 246.562130] ? _raw_spin_unlock+0x22/0x30 [ 246.566263] ? fuse_file_alloc+0x298/0x3a0 [ 246.570490] ? fsnotify+0xbb4/0x14e0 [ 246.574192] fuse_do_open+0x25c/0x540 [ 246.577987] ? fuse_file_alloc+0x3a0/0x3a0 [ 246.582207] ? fsnotify+0x14e0/0x14e0 [ 246.585997] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 246.590579] fuse_open_common+0x160/0x2b0 [ 246.594713] fuse_dir_open+0x22/0x30 [ 246.598411] do_dentry_open+0x818/0xe40 [ 246.602371] ? security_inode_permission+0xd2/0x100 [ 246.607371] ? fuse_dir_release+0x20/0x20 [ 246.611504] vfs_open+0x139/0x230 [ 246.614942] path_openat+0x174a/0x4e10 [ 246.618825] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 246.623568] ? find_held_lock+0x36/0x1c0 [ 246.627617] ? lock_downgrade+0x8f0/0x8f0 [ 246.631745] ? do_sys_open+0x3a2/0x760 [ 246.635621] ? kasan_check_read+0x11/0x20 [ 246.639760] ? do_raw_spin_unlock+0xa7/0x2f0 [ 246.644156] ? __lock_is_held+0xb5/0x140 [ 246.648208] ? _raw_spin_unlock+0x22/0x30 [ 246.652340] ? __alloc_fd+0x34e/0x710 [ 246.656123] ? usercopy_warn+0x120/0x120 [ 246.660176] do_filp_open+0x255/0x380 [ 246.663961] ? may_open_dev+0x100/0x100 [ 246.667921] ? strncpy_from_user+0x3be/0x510 [ 246.672317] ? mpi_free.cold.1+0x19/0x19 [ 246.676373] ? get_unused_fd_flags+0x122/0x1a0 [ 246.680943] ? getname_flags+0x26e/0x5a0 [ 246.684993] do_sys_open+0x584/0x760 [ 246.688695] ? filp_open+0x80/0x80 [ 246.692221] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.697745] ? ksys_ioctl+0x81/0xd0 [ 246.701356] __x64_sys_open+0x7e/0xc0 [ 246.705144] do_syscall_64+0x1b9/0x820 [ 246.709032] ? syscall_return_slowpath+0x5e0/0x5e0 [ 246.713945] ? syscall_return_slowpath+0x31d/0x5e0 [ 246.718865] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 246.724215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.729047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.734220] RIP: 0033:0x455a79 [ 246.737387] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:48:33 executing program 0: [ 246.756608] RSP: 002b:00007f5485fa5c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 246.764299] RAX: ffffffffffffffda RBX: 00007f5485fa66d4 RCX: 0000000000455a79 [ 246.771556] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 246.778809] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 246.786069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 246.793327] R13: 00000000004c0344 R14: 00000000004d0158 R15: 0000000000000005 11:48:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x68, 0x0, 0x2, [{0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x68) 11:48:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x300, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r1, 0x0, 0x1f, &(0x7f0000000000), &(0x7f0000000080)=0x4) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:34 executing program 0: 11:48:34 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x660c, &(0x7f0000000000)=r2) 11:48:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f58da646f746d6f64653d30303030303030303030303030303030303034303030302c757365725f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:34 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:34 executing program 1 (fault-call:7 fault-nth:6): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:34 executing program 0: 11:48:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) fremovexattr(r0, &(0x7f0000000380)=@random={'trusted.', 'max_read'}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) r1 = geteuid() getresgid(&(0x7f00000000c0)=0x0, &(0x7f00000002c0), &(0x7f0000000340)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4400, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@max_read={'max_read', 0x3d, 0x1}, 0x2c}, {@max_read={'max_read', 0x3d, 0x3f}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@max_read={'max_read', 0x3d, 0x6}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}]}}) 11:48:34 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x80086601, &(0x7f0000000000)=r2) 11:48:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="6d616e676c4b00000000000000000000000000000000000000000000000000001f00000006000000480700001801000018010000180100006005000048040000780600007806000078060000780600007806000006000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000004000000000000002800434f4e4e5345434d41524b000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008801b00100000000000000000000000000000000000000000000000030006672616700000000000000000000000000000000000000000000000000000000010008000000070000000401000090007372680000000000000000000000000000000000000000000000000000013c61aa053f000000fe8000000000000000000000000000200000000000000000000000000000000100000000000000000000ffffac1414bbff000000000000ffffffffff00000000000000ffffffff00ffffffffffffffffffffffffffffff00ffffffff00000000200010000000000028004453435000000000000000000000000000000000000000000000000000001b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000038018001000000000000000000000000000000000000000000000000280069636d703600000000000000000000000000000000000000000000000000040044000000000048006862680000000000000000000000000000000000000000000000000000000100000000010000010008000700b4003f00ffffdda405000000030091620000ff030300080008004800534e50540000000000000000000000000000000000000000000000000000ff0200000000000000000000000000017f0000010000000000000000000000001d3c000000000000ff01000000000000000000000000000100000000000000000000ffffac1414aa00000000ffffff00000000000000000000000000ffffffffffffff00ffffff0076657468315f746f5f626f6e640000007465616d5f736c6176655f3100000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000100080625000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000004000000000000002800484c00000000000000000000000000000000000000000000000000000000010800000000000000000000000000000000000000000001ff02000000000000000000000000000100000000000000ff00000000ff000000ffffff00000000ffffffffffffffffff6c6f000000000000000000000000000069705f76746930000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00010210000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000280065636e00000000000000000000000000000000000000000000000000000011108081000000002800484c0000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x7a8) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$mice(&(0x7f00000019c0)='/dev/input/mice\x00', 0x0, 0xc43) r2 = syz_open_dev$midi(&(0x7f0000001a80)='/dev/midi#\x00', 0x9b1, 0x400802) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000001a40)={0x6, r2}) fstat(r0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000080)=[0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0xee00, 0x0]) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001000), &(0x7f0000001040)=0x0, &(0x7f0000001080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000010c0)={0x0, 0x0, 0x0}, &(0x7f0000001100)=0xc) r9 = getegid() setgroups(0x7, &(0x7f0000001140)=[r3, r4, r5, r6, r7, r8, r9]) r10 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r10, 0xc4c85512, &(0x7f0000000940)={{0x0, 0x6, 0x401, 0x800, 'syz0\x00'}, 0x1, [0x81, 0x1000000000000000, 0x3, 0x4, 0x9, 0x5, 0x80000000, 0x3, 0x4, 0x0, 0x80, 0x1f, 0x2, 0x10001, 0xffffffffffff8001, 0x6, 0x8001, 0xa2f, 0x4, 0x0, 0x4, 0x7, 0x100, 0xf5, 0x5, 0x9a02, 0x4, 0x45de000000000000, 0x1000, 0x80000001, 0x8, 0x380000, 0x1ff, 0x4, 0x6, 0x1, 0xffffffff80000001, 0x4, 0x8, 0xcf2, 0xdf4, 0x7, 0x401, 0x1, 0x5, 0x8, 0x4, 0x2, 0x1, 0x2, 0x454, 0x100000001, 0x0, 0x2, 0xff, 0x8, 0xc87, 0xffff, 0x7f, 0x4, 0x49c8, 0x1, 0x3, 0x4, 0x4, 0x7d0600000000, 0x4, 0x8, 0xad, 0x3, 0x40, 0xffffffff, 0x1, 0xffffffffffffffff, 0x9d, 0xffff, 0x1, 0xffff, 0x0, 0xa4, 0x9, 0x3, 0xdc2, 0x1, 0x24, 0xffffffffffffff64, 0x4, 0x20b, 0x2f50, 0x80, 0x2, 0x47, 0x1, 0xff, 0x5, 0xffff, 0x6, 0x4, 0x6, 0x2, 0x1000, 0x8000, 0x0, 0x4, 0x5, 0x6, 0x1, 0x4, 0x2, 0x5, 0xfffffffffffffffc, 0x9, 0x7fffffff, 0x3, 0x4, 0x4, 0xef8, 0xa6d, 0x3, 0x33, 0x9, 0x8000, 0x4, 0x40, 0x1, 0x2, 0x20, 0x9]}) setsockopt$IP6T_SO_SET_REPLACE(r10, 0x29, 0x40, &(0x7f0000001200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x748, 0x248, 0x428, 0x338, 0x0, 0x248, 0x678, 0x678, 0x678, 0x678, 0x678, 0x6, &(0x7f0000001180), {[{{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}]}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@unspec=@connlimit={0x40, 'connlimit\x00', 0x1, {[0xff0000ff, 0xffffff00, 0xffffffff, 0xffffffff], 0x400, 0x1, 0x3}}]}, @HL={0x28, 'HL\x00', 0x0, {0x1, 0x5}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1d}, @dev={0xfe, 0x80, [], 0x14}, [0xffffff00, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xff000000], 'bcsf0\x00', 'veth0_to_team\x00', {}, {0xff}, 0x3a, 0x1, 0x2, 0x54c950d9577242e1}, 0x0, 0xc8, 0xf0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0xd}}}, {{@ipv6={@local={0xfe, 0x80, [], 0xaa}, @loopback={0x0, 0x1}, [0xff, 0xff000000, 0xffffff00, 0xff], [0xff, 0xff000000, 0xffffffff, 0xffffff00], 'team_slave_1\x00', 'vcan0\x00', {}, {}, 0x1d, 0x1ff, 0x3}, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x228, 0x250, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x10001, 0xce2, 0x94ba, 0x3f, 0x30, 0x1, [@loopback={0x0, 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, @empty, @empty, @loopback={0x0, 0x1}, @dev={0xfe, 0x80, [], 0x12}, @empty, @mcast2={0xff, 0x2, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}], 0xb}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xb}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x7a8) 11:48:34 executing program 0: 11:48:34 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086610, &(0x7f0000000000)=r2) 11:48:34 executing program 2: r0 = socket$inet6(0xa, 0xc, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0xcd, "314560573840e141b31315dbaf46ebdf1ada32a6b3bb8ecc77d2c180a3d010477886ed58f75e8a706feafa7e6224704c21a560663b33a0c559a00ce4d086103c7ca69eb05af1c596e1568d8875da2c88f063e6d33d6b334153ce9e1038d314e507ca40947692edea63017c2b9b0c04e0917667143601569ab1585a6124cd443c320321511f885aa2106450304876e042ed584ed1b61058ad85a51f4ade101fa4e759ae5d810d9a541787ce6a80e426979687dfc3aaf35aa2bb591b076e7c0efefe2033c54df6fd6a2d4f0536c1"}, &(0x7f0000000000)=0xf1) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x1) 11:48:34 executing program 0: [ 247.242108] EXT4-fs (sda1): resizing filesystem from 524032 to 21 blocks [ 247.249073] EXT4-fs warning (device sda1): ext4_resize_fs:1929: can't shrink FS - resize aborted [ 247.280740] EXT4-fs (sda1): resizing filesystem from 524032 to 21 blocks [ 247.287774] EXT4-fs warning (device sda1): ext4_resize_fs:1929: can't shrink FS - resize aborted 11:48:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x68, 0x0, 0x2, [{0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x68) 11:48:35 executing program 0: 11:48:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) 11:48:35 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0xc0185879, &(0x7f0000000000)=r2) 11:48:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x204, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:35 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:35 executing program 0: 11:48:35 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0xc0189436, &(0x7f0000000000)=r2) 11:48:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x8, {0xd9dc00000000}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000840)='fdinfo\x00') getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000880), &(0x7f00000008c0)=0x8) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x401, 0x8) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x1, 0x240) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffed0) 11:48:35 executing program 0: 11:48:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x2e, 0x4) r2 = dup2(r0, r0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[{0x8, 0x5}, {0x7}], 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x14) bind$packet(r1, &(0x7f0000000180)={0x11, 0x8, r3, 0x1, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) 11:48:35 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0xc0045878, &(0x7f0000000000)=r2) 11:48:35 executing program 0: 11:48:35 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0xc0045878, &(0x7f0000000000)=r2) 11:48:36 executing program 0: 11:48:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x10000) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x1, {0x10000, 0x4, 0x7f, 0x7fff, 0x3, 0x3}, 0x1, 0x3f}, 0xe) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x0, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:36 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40049409, &(0x7f0000000000)=r2) 11:48:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x214, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:36 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:48:36 executing program 0: 11:48:36 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x6609, &(0x7f0000000000)=r2) 11:48:36 executing program 2: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) getsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0x4) r1 = socket$inet6(0xa, 0x800, 0x40000002) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000006000), 0x1000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000480)={0x51, 0x4, 0x6, 0x0, 0x0, [], [], [], 0x10001, 0x5}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000340)={[0x10001, 0xffff, 0x3, 0x3, 0x1, 0x8, 0xffff, 0x9, 0x1, 0x8, 0x6, 0x8, 0x0, 0x20, 0x8, 0x8], 0x100002, 0x80}) 11:48:36 executing program 0: 11:48:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/41, &(0x7f0000000080)=0x29) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x800, 0x800) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000200)={0x3, 0x8, 0xbb, 0x4}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) r4 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7, 0x5b, 0x9, 0x1, 0x0, 0x1000, 0x8300, 0x4, 0x8, 0x4c, 0x6, 0xffffffffffffff80, 0xffffffffffffff46, 0x0, 0x6, 0x1, 0x0, 0x85, 0x7, 0xfffffffffffffb6c, 0x2d7, 0x5, 0x3, 0x0, 0xfff, 0x7, 0x5, 0x77, 0x100000000, 0x81, 0x8, 0x3, 0x231, 0x5, 0x981, 0x5, 0x0, 0x7fff, 0x5, @perf_config_ext={0x6, 0x9}, 0x2, 0x1, 0xa6, 0x1, 0xfffffffffffffffb, 0x295c, 0x8}, r3, 0xc, r4, 0xb) 11:48:36 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x80087601, &(0x7f0000000000)=r2) 11:48:36 executing program 0: [ 249.325999] IPVS: length: 41 != 8 11:48:36 executing program 0: 11:48:36 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x400866f0, &(0x7f0000000000)=r2) [ 249.349606] IPVS: length: 41 != 8 11:48:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) dup3(r0, r0, 0x80000) 11:48:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x0, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:37 executing program 0: 11:48:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8802) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:37 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086607, &(0x7f0000000000)=r2) [ 250.080623] EXT4-fs warning (device sda1): ext4_group_extend:1761: can't shrink FS - resize aborted [ 250.117711] EXT4-fs warning (device sda1): ext4_group_extend:1761: can't shrink FS - resize aborted 11:48:37 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18}, 0x18) 11:48:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x202, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:37 executing program 0: 11:48:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x81, 0x200000) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000080)=0x9) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:37 executing program 2: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x208000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x6, 0x4) dup(r0) 11:48:37 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x5460, &(0x7f0000000000)=r2) 11:48:37 executing program 0: 11:48:37 executing program 0: 11:48:37 executing program 2: r0 = socket$inet6(0xa, 0x100000000002, 0x7fff) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) sched_setparam(r1, &(0x7f0000000080)=0x1) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x610000, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x8200, 0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000180)) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f00000001c0)) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:37 executing program 0: 11:48:37 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x5452, &(0x7f0000000000)=r2) 11:48:38 executing program 0: 11:48:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x7f, &(0x7f0000000140), &(0x7f00000001c0)=0xffffff6f) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) 11:48:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x0, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:48:38 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x80086603, &(0x7f0000000000)=r2) 11:48:38 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18}, 0x18) 11:48:38 executing program 0: 11:48:38 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x5451, &(0x7f0000000000)=r2) 11:48:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) socket$inet6(0xa, 0x80006, 0x0) r1 = getpid() getpriority(0x1, r1) 11:48:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xfffffff6) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x1400000000000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:38 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x8000, 0x0) sendmsg(r0, &(0x7f0000000880)={&(0x7f0000000500)=@vsock={0x28, 0x0, 0x2711, @any=0xffffffff}, 0x80, &(0x7f0000000800)=[{&(0x7f0000003000)="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", 0x1000}, {&(0x7f0000000580)="00e515482b5a37ef4434dcbda8726bd6210295163ed84add6934b519450096f04d1d175cfa6c6ed2f11badf9211b01599176f1f5330fdeaa5274f00664451b4c3d251676977c2c74203a6abb0a814c441dd734ea17db0f7e0da8693566be3a9828f889a56709b7ecf40533e5bca074edd9e068c401f54c3c3f2c406d957bd7", 0x7f}, {&(0x7f0000000600)="8ad4233ea8fb8994f712f82c2025a13b2454e56bbcbced77172616a36ea9ab2702ccf5de58f961632625eab6b54127ccb7afdac96c2d60cc6b0292bdf08ea41a15a1183b263ce4f408958de758f5b01e7f46ab8b78e1b2f6dae3415a1620b0102a662a663596327d74c5c3c31a135867ba89009e3291617f", 0x78}, {&(0x7f00000008c0)="55c365929ec957834191a2f7828d09dc4dc1bcac9f673cf770f2ea480c2fc32c6187e8fa35d21dcc9a947bd7e1686524be9da79c4efdb2c97b7e7e8ccd10fbe32e54f07f1a37b30ad3a37cb9e0f0473589f62e258e653db29100f69918fe38ab2a9ebd20649468bbc42ffe5b0feef2ac77204a20c558f4a54ac5be3f6d5e6e1d9e0f15db8ffaab4ced86", 0x8a}, {&(0x7f0000000740)="713586dba2b3459c7679dd1b3827c27248c14c5b7ef9bfb0d333e50e616e573fd68ad19c5ad0de928b3ca0f54a5ac5475d58cc7bceb434eea7d5960320b0ddddd7c8a5bd40b5e4352ed6227e44938f37044d08d8fbfb43e10d5356e811f557a2871de92f7670dcc38bd3771315792f090567d1027f9ed6d669774d46c434c4511b72bb485e01233e158f3218e7659853860afa01e61d5aee72d115c439b3afb95ba351fdd5619e8815b7255e56ff7cc689fdc1a1e0", 0xb5}], 0x5, &(0x7f0000004000)=[{0xd0, 0x0, 0xfffffffffffffffc, "01ae252839c6328772220d6c8365200e60afa87b5415ae26737a86deeb37e6dd4cdaf6539d0a9441662a7efa9d7adcc443a30bf178b63b6ee270519fb6339131890b683fb9106f6c05eba17ffc659b08e6268c40e7ce92da9c8f53b3b4543793822b0865004604cdab68d0263d7ed64d7ff30703180b76ba84c6465c5412b13c628bb1386e2922c7873d5b0416fc1a1c04081353bb8c74aeb9aa46bced8f18ccfc5f00041b20e51d32a83b53cdb144199f44ffd3e51988ea8d9f"}, {0x48, 0x114, 0x7, "e0fda2202627103061251d86754d054e8fc7582b304a340ea27c488fa087e93f130b0cf117c04fb19462af35879258eb814f98401e"}, {0x110, 0x88, 0x67, "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"}, {0xe0, 0x11f, 0x8001, "f5969a1616ff42223cd0021c92ff061f1ccedd363b8ae9050ccce1f42ef7ddca366202f1a818231bc42673852a26a49f27818fe7679e4e9d1dc4adf78bbc89c38f3cfd5906cc48e7f67613bd22daf61d311dfd02505295728363c19dc92c7c42aa1cc3a63cf99704981c33d0729e2c0c8b902bb80fc281f3b0b76111c3b461ca79015dd1684b1ce3de88a7b44000c8c73facc4091b13bfe3d1bdb5be081452274791d45475302093952a329f7ddf8898c2b6f35a0420bddf41c899a080d3684629825a07c2f23fb7dc"}, {0x48, 0x112, 0x100000001, "74eadfc99a0feb0e1094285dd4072b3ef6d697718f5e327749c166626ddb11a329506bb7a3113d53079f2df667eb6ebcc49938"}, {0x98, 0x6, 0xb, "02c6a3d2b7770239732243ba0f378141eb64ac88903795d4240c25782beb6cb2aa91923001632ecf32659deb7656348a31c56ff9f6391f6c5ced15db8216593f80fb1b8a3143809bbbccff0c3273e0f59d3f8d543b233ee85fa0932dca8bbe91cbdbe43963cf054d32963b5d17f540cfa5cc324b40bd8aef1ec04488c7d63fd5468839caf4"}, {0x60, 0x10d, 0x884, "f17654cfef1cfc63d5cec7594edd8d1d247025b38fa0f2224aed9e3431e62eebbf875ac7e1ffec61ce07add38ddfb7479a322e1b8cf1adf8e1529cddfad159779cb39eab2d13532c5ee23b761e"}, {0x1010, 0x113, 0x3, "be4c2c2fe5c244b42afa084b3083982a4095104ad804f0ba59f8636aea5bc281251ead43fb570d6e3b6dfe44a49b890cac458a92fd46bb2faea8618b7abc53729fb69a56ee31137cfaf92db22e834f2e963fc6a21daa510acb2a6efc2be82c906c4049a577acf45696fa5dad6d1482b84dcb062c4f41bd2bd8c9775948ef1fdc8d9770f801eec08374f3085528f579d35dbde0fd3f77cfb70d6b80e95d8138e7aa7dce4c57133d2e4c5482b1ea2c0ba2e3a35649020308439d430bc75252de9a2c014b0a036ba1335a1d072a4cacd4c394e91aaabfc212e7fb82094e779961fe258368784d8f3c89afe54f11fa15996138e11b631ca6956292af73817deac81134733463bdaffe98cdff3e35325bfc31ca9ed4c4f19bb59eb94bb8e78cf81d38ab14fd57735a5ff87d4c371b46128deb0df7fdeb1d634940e3264cc8deb386981d416ee8670571f9268540d31ad8efcabc601cfcc3ca43b6a54b64e55640c1a336356dbc0908180dce64635219e881c753e885ebe1fdafbbf969b1d5afa787a5fb08db3dad902d22d76059afee1c142c0205c35b64b4995215a4f56b84f828df7049333631c9a894270662b909cade25fc86ffe5a69693384ad785c53186e8d7a1f0d5ca29f7a047d1f27f2f053bb17e2d5accd7c995367c179481d7309ade6afff1000fea8f68de1947c2c6d967b72143ae4a3fb822d5c4c379d9040aded662c165b2016e5df486d9e77f639e7a4e9ee0fccc83404bcd2208f3b3cdd5257d461f68d206aa1f877526141299e7795aec4059e78a362ba1f92aab67c40cf40b6f3ea9d4f8bc76dbe6f481d27adb31e0e57a59b78c12aa5c4017c822719dac25ad17e88f02bf087f6db1ad979469ee6a0238467f45c1fac3720532ce4daddb6aa6e5012b8142ee6ceb28f8ad567039b434ea869ad88368c0dbcb39ebd36b428fb3e29c5cb28c7730944b435724efd327bf1f36eb51e082d373bf95028ea1355a4a66452b77919aec2a32a884f3d9b43f36a3a81c240be7227911484cc71f24183f159d52cdc68918ab701fe9a9cdaa6d3c28dfee3f86ba47754a99301f48114e619e12faa152f5512219452bc4311680b90518aeb40476a092cae4aed2b67c147a9f2b07d0efe27e2740101eff79a9e91130391392c8bc0682f7306289324877806fa8d2341a73b451de79bd61d9a5554351590df09f52d96e9667034f64a3431458afbc753c1042294055fd55cc99deef4cebac809e74a739b86995238d86271616359df3a020f240bf3d4d15603bc7779ee3ed49e48c2f4f1275c08c0af7d2d175596f01def561e6610b0d06ac5a0d4c14ff99207ccf2ed5e0b029ad64b0775df48cf3f559f98fa2d822e81b7623fdae32eb300c744156e693e47e349a61593b3e7ee5cab5380afad96af73be433501a45d8f9b7825fdb2e4f668a6da1f68add855c1620082f4f6e7bad5339e927364be79ef7a037e62e9cf99e0b5c4b1aed22a9dbe3d8aba5be71844a14b40d68fa42d56c03d065265e96bbc1e84e9a5814e9033049fe22309b20c9b9f73bf1ea6abb2eb9e88a57ef3877cbb87ec740af0717a9035a7c4e94d9b25515cba1c9b24223112433fcc00a324b1df323d27b4ae0fd571ff257a025eace4dca037c9de8736770fdc0d31e421a1dec260159096bab052172dcaabfc07223d1e4ef9bbeeadc4c2a2de581ac3b3679ae837daab3d1082434a3025829fc3ddf837744929ccfb2afa374d2b4ef1c6c95d4a76f96f7e1cae3b05e6c73fbe02c7ede413aee6d4f9544c1d85769327614d533c53e637d74e633b6a18a852eb2f42672a68a7a41c9b5aa1371adf7a2dca30e047e3cf56f44719d911215893b241061457d92e4118a5091cac600eec0ce1ecfb9d11133d925a70fdf273ac95a7ed1cfb5a56ab5f907943dc9f170d0b869a5e6b9fad9404d404b08cd285b3b7fa81251bdf67db0dec0690c3057b75ff2ee27a39704e7811ede2de14e19f422df3f32725c3bf39d7c645c10376bb2ba13a7a8e2feb05436c41568e2104231da47d394f996a988dbff5faffc5f2f637bfc992e098bd433543f01ff34fce6a22291ee6577ceabd9494391c1550fe024a0cdd035f649189bd219c3e5c8e5416773d5e25d2bd322bccfd1be5868c69da751002b303ef39fcd44e63f200a9d31da365f945c75e141cbeabe8ac0fa334fc107555d88d4d69b54ee2ab826a937076607f0327e7c30ec9ab3186cf3a488c21f89ca910ba445c3b22d456ac58f0faf90b627cbc8f83ab10cf666293fece8d8debc2936ad203540130cab83e41a99df1278ff07d821940d34c367848b33a7c5c99321ae450befc853c9cacbe213e813306305b15facedacb9f5e91820024e51ea5a483dd5ee33448a8df5914e5f408069d5ebafc7719cf6ec46202fd0969cf9cc89ca7f4a5fb21571c88a067658ffbaabb110d54c841e5776fc07812410582fe3632cc33a826af27e5494238f19750238c5c5b79f82c04c9538ba8c2b55c6a61586b6f0ff4951d57bc63b7cc37adba3476711734f0122e23a8b2ec28c4b3783b28671960d0bf95eeb7ebcc7aef59e35a8eb03923c0c4b1b2df0bddd68ca1e09bb56235cc85323a0829194e350a302f5361b6af70feae580b2207cdbaf87686719c32c3ba1fcbd7814896b4d5df68e735e0d6e1d5d1fc7c0ba54d5602ef88b47d6b455a315dd9fd002a307d8211d46bc4e04b8320f8a8982ac64541a5dadd9e802f1312381197dffdf921b9128ff2a881b44d9190d8a939efa83948ace1751b050213f9096816c753639866b389ebff7344c31dcd007562fc54f88f313a7b0b7199e9f3779e48906d894da3463732a4d51c2a25e3697bd5d90fbb9f034c68427bc4b6c6d999e331582594d236f3b97f8815c594ae996f2dab07b25ea7922a93e1f43003f7cdbd656377a8d2ef68832daa54375d60ddcb7d3a82e107d1cbed6c3d575bc38888624e6ee47b4a3a64d0b867d913880889b75e06f544fed4b1640aa4736469a360389b3c598609de64cb8429d795789b1823d8962d2142c4890464f7ab36af7f134ba1baee50dfb0a65fff24ec7e7d31f46c939831b10fb7da9df65461996c3d6554d3baff2cf19aa6d5d6a9e29bcfa1cbbca89f646bc5b7d11d80945447b863a43cba6aba50778a568f66329502917b12a8ea0399dbd129edf64888a56fa76e8c0cfa9f98f1b6b07fbbae11a1e4fffe3679042fbc2adfb37b1c514a89a00774c6adb47ea868c07507546edfca7fb33df35941f5ba2881eb90c3464814bdba4aa9bab64a23b819c4378dd54ef2f194dc49a324c533efcb13e4fb7163dd206b05877cf35273d529f9691c00e889b2d5bbb49d3ba1fa9d4dff96cf3200c338138cad970f1a6abd1136726b9871158a9959c59e6c43ff45aece81ed06bc90f0f6494abe129081f99c321e6c6ee3b7e45a7033d50e80c6cc275c6296ebb497224af2743e64ccb17fe609e7f9f1581b010a5adbcd6ff5b2cce7ea112d4762dcb655ef7d933df13629419510b843616b362d8a6010386fb8006357131b0cd187ef43ff450fa91444076de2fe49bb28c43880a0171427c0e4daa7818e0e4bcd34c42d01961676fd41753d5fa613ae05982b30e02e008d5cb7e105b1fa125970f3b3891b54cabca59e20ec1bd780368b0b328acab00cb71b32b2f9443f32ff6f38f6793314da10ae12e735f25699d09d9e0313d4716d55f31e12e86651bb97d5af409c7f9ef5f56136dcc431a9164747d667e6bcebcb4206ccc964a361164d9cb1298267072af1d3fcc2251751bf876ae3ee51d414b7e8a57189cb681f7a99b64f7b7ce2d28243e2fc01068c2d1afec4c81f3ac4a9c2356a11b044977de29e64bc84b46a9376f9b97bbc9b4cb5a5472ef855416e0356396b1278edcaa975bffe981aa530c601db26b087c119a7023fe95ff521485be8a7dac543cf3880e4ae2cc22065f604eadf26fde6754e5764b83e58f465e8be3ea5eb69072d1e7d36a7f25d408ed51ce86b47bd2f7b6c415054fe83853e9bb43ece46716f4ada021008ebfab2a116d7baac401cf973690fdd54a15428f4afac18f9dcd8e29aa11ea7e45a3d9577ea7225dbfe5bde97efbac09b6245528e8fc8e0ebbf99c8b854f4ff5e6c0590a29067a21565bed68d9c313665408e45f5cc1a3bf025c3b7e61a02d313648b5ee3d941081a6c7aab73348420532369152731700e243e703a009d5b6f2bc20cebabd86ba8dca01722e6c7031663b3ff55ee79f90fcaf8ff2a8b2d29cc51e81ffeae9c2c25e6bb54beab0c37086967d2f28ae915c48291f2e7d433a092b6c70b9ae79576b0b5595aab5da722824cc92dcc8b41c364e081e3d5d0866baec784e4aee3e38bfc3fdc04aa9c3dc6b09813387acaeef54548235810868e774e31dcedc77483ab6d53025def524923cd48dd147b52b82aff8b811ac47af1675baa8965813a8ab623163b42064240c4bcbd8c757e85a5eb0f8293ef6190820214318f15de6de34a858689d075e49fe53b8a699e905b629d2ebd4818a82abcdf30a59e46f7790a962aea130cf9ba3ca3d360a177af23554696fb388f5311c4e01c05f2740584c627756f6b0b347bb9a3a2a70239f39887a3adbfa9697bd657dd50a314dd71bcf5a4ead3b7bb2431dcdcb12745c671c2b35404cb68352016ca76d0cea8e34fe56d6b59b78ea2f964014eaf678ee6366f9167ac2ac709af42cb99c0f7094dd2372eb8cd1e5c4e7f22863bb2cdcfda361ce749c5574244f27545b386af302dedbb90f0c07bf8ab293a3d90b72781d21f0fd07c534818561d17d33dd1ea0b0d8a7167930a2679678002c2661f8a038ddb79f8c96c0e8f426f24bf777caf0acd0453928e56473fc35acdd1e26712c514547a221218cc07e92b5fe6bfee27751c3fa7232d496eda319c013a9a23d209c74ba725239ff7b305979ac8e4982dae46ff89a58b129547071742dc857b7e5b54f2955db71324f933c39960a8f20eac92ec840039b9136e8fe718179e32a1316ad34dc721a510a77f913e44afe025b294ba4b13bb7e713613a8649aead9f437ce0a81656b8f8827c8b386cf607a61647a821edb3a444c31f9f06645e1fd74e65f2c5c202e83b61d86c99c4c529d9aedce78c2390d3070bc00effeac4e2cfe8232b8c6c15583626ed07f5cdad0478e332cb9b4869121ac92c3b3c43a557a9b07d788cc34cc739c0a4f38167e712da47eb261cf05e4f9381329eeaceb700f8fd78597f348e7c6799f5049e945101444009c98d8158f752b29e73b7473a3f8cb3be07ee7d222a8ca799ebc9d789634bd378af1d66d4839db39c957d86f759214a32ccc9574a51db674a8a7a944e0c70a9429c2d5dfe34d9d057f18537eac235b9d3cfe4f212ef6f13c16ba93f74843d0e828e3ede3f20bc81d9129dde21810819d61c80f91baa6a6f099257d44b6f0dc683d42d0a8dadaea936c346d3a62077c9b680319b278f9eda5bdd0583396851242681c12011b023b7141b8a6790d89d3615f912c164dd8a8a5dc17ba757d1cc5d1d22816222b0d1205584480ab7a37d674798c5b1c22bbf8b632067f5e0b4c83d8ea0eb784f1eadfda8961ce52313efd8eb4cf4908cb4c4b8d05af2460721f4fbdb54138e41953cf14c88a877a0c47a6161fac695478d78d8136ff1ea2558e03c8c661d68adc59123209a18ef39820383b02f4faafc956b91da8ee175fdc24ace1a7706f13cafc5d79df76798bac038c2ee893e4f7f8af558620ceff036cc39877dcd4217c6a8dc132c827e53e1b1"}, {0xf0, 0x10f, 0x2, "53be2b27a45ced89ceb6d9ab44ffdbe17dbf202c0254c216ac2a097cbffd41e5705a5063c70b41f77ec13436b9c587d8cd5e7f67637b67d25b5e333a62ba9bb027ffd5659333c781baaa4e784cf1ebc5e30b2a55f614483ec538d81a1a334dab8ef13e115ebac4106886785607efde2b6984c515b7032e2f5463ed608b80866a425be10efdc2cbbf7770856393bf84c7d044b728d60a182668c128e777bc2af94156557c18a7ac2dfd4230a76256a4134fb39742ce095eb5182a6a30e6863616a101ff0113c9efa9cc1faef990169e2fc55d9876f5c0c3279aac94"}], 0x1548, 0x10}, 0x8000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x3, 0x20000000) read$FUSE(r1, &(0x7f0000001000), 0xc84) read$FUSE(r1, &(0x7f0000002000), 0x1000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000680)={0x0, 0x81}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000ac0)={r2, 0x230a}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={0x0, 0x2, 0x2, 0x7, 0xfff, 0x4c66aafc}, &(0x7f0000000980)=0x14) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000009c0)={r2, 0x9, 0x10001, 0x3, 0x4, 0x3, 0x7, 0xd0c0, {r3, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x8, 0x4, 0x9, 0x1}}, &(0x7f0000000a80)=0xb0) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="9baa869a9d2f5a47a308622f96a3ace0cff40e0abf005b69aecdbd9c42d637a54978d4cbd568976eccd61f761ab8607d28399c970cc0d8a052bdd1fb06c7f29e47bdf01875f03248bc0a67d3093deafae90d8fd8927ea122dc4be45f4a81ab0c92fb9161d47540688af3f209ac1043a2064b34fa2fa15a78f2594e3fe4cd8ff7ce96f7ea87d1ace322ef4a4befbda4e72f1b749ea7aac8b68d785b3ba8a7821eac9997a0624ba10cbfeb3d24663ee6ccc686120dac80ea21d9aa8fcf54ed8587d4d103d7bd1505a24876a74b200227e5b9bb7b2697a999bcd5fcccf9fcd3627d", 0xe0, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r4, 0x8, r5) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x10000, 0x57) 11:48:38 executing program 0: 11:48:38 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0xc020660b, &(0x7f0000000000)=r2) 11:48:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:38 executing program 0: 11:48:38 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x1) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000180)={0x400, 0x101}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@dev={0xac, 0x14, 0x14, 0x17}, @loopback=0x7f000001, 0x1}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000001c0)=""/189) getsockname$llc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x10) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) write$eventfd(r0, &(0x7f0000000280)=0x7fff, 0x8) 11:48:38 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x800c6613, &(0x7f0000000000)=r2) 11:48:38 executing program 0: 11:48:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x70, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x70) 11:48:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x7f, &(0x7f0000000040), &(0x7f0000000000)=0x2) 11:48:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x7f, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, {0x2, 0x4e21, @multicast2=0xe0000002}, {0x2, 0x4e20}, 0x1, 0x3f, 0x1, 0x90000, 0x0, &(0x7f0000000100)='veth1_to_bond\x00', 0x1f, 0x3, 0x3}) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:39 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x6611, &(0x7f0000000000)=r2) 11:48:39 executing program 0: 11:48:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xf0ffffffffffff) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:39 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18}, 0x18) 11:48:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="ba0000007d145f623c53115224bfa95003bd04798211ff0c5facd4f82ad376710f17e4938abab0354cd74ba06a8046cdc662ced679cf160906bf4462b0f05d4a42ccf3ccce665f9a225bdf104d20fead53f4377d00baf90971d5ee83a77df53bf6a051dcf0e3c0e76c7a2dc5b35b36d899dc5e0af9bd9d783e3de559ed25d34348754c85830aa9da6a42e45f6acb20ef06763a67cd7cba1819af5421aaceae840e25afd7581ff3bca1c90f80ed73b5926f21b12254dae300526ccd929c3e71ec7280e5fe0c0643a0a0805c6cb4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:39 executing program 0: 11:48:39 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086604, &(0x7f0000000000)=r2) 11:48:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) r1 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x90, [], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) preadv(r0, &(0x7f0000001c80)=[{&(0x7f0000000780)=""/13, 0xd}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/103, 0x67}, {&(0x7f0000003000)=""/185, 0xb9}, {&(0x7f0000001900)=""/130, 0xfcd4}, {&(0x7f00000019c0)=""/148, 0xfe22}, {&(0x7f0000001d40)=""/237, 0xed}, {&(0x7f0000001b80)=""/224, 0xe0}], 0x8, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/llc\x00') sendmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x2, 0x7, 0x9f9, 0x0, "a64ad2aa97d58921f4554af9ce18f60b223512a85c7f8240e67e7403227ffe99ddc7edeb0a711e83c0f0fe70e3a2c109d056e99a1a455557e8ab461ed18635", 0xe}, 0x80, &(0x7f0000000540)=[{&(0x7f00000001c0)="ffa6fcf47cad4ff7309db489ea301e6869c1b09b86bd0f5ce4ff20ae8d4156e29f1eede0cd21d88d762bd5c392146bfeef0f3b88dfb8631cecf875266dbe9468465bc178e214f1d780c7d225e8d9fcab03c62033ff79ea8d6c414ac7fd888a954f3834e8293834c1e52d4215bdf6cc77c3b8f79f01667cbb8e4ab21cfd7222304da7e27de28e50dc461b547af104c6e6e5cdc42f7e75a1259f82e3fc278731042ad0f966e0ffa21c32b1bceb453d7baff8a4014ce4ad28e1b28cba35a044bb90d719dfcf95c9c5826c850bf94e0a2234f78f2cf815a1f89267b3439e29da108c8ea96f780b6e033465d2efff7e", 0xed}, {&(0x7f00000002c0)="a033dd937e84a72f033cb054b9e66c3afae1043b2427f637e94f0e67c0c9af06e9374becea3209a2aae642087866", 0x2e}, {&(0x7f0000000300)="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", 0xfc}, {&(0x7f0000000400)="52d0fa3f8245ba032914c5dff8eb65f8e967e25225419ca3b9b87a3be58ded4be0fff3bb0c2c2ee26c3cca184e50f2b4d89c5cfa97f15c00eb3c3f3acf5c58a93d6f8b32db0d0c3a3962287655f0f39b1ef875ab82dbb1a3d06263cea2f52d4237d91a74d7a43f3d5538222ab6d832124ee8e8e0e7fab533354f31fd49929becb29bd909186b0a543f31b2bf315d0282af3a153a1fb7", 0x96}, {&(0x7f00000004c0)="06235ec1aa92056c47cb2314f53f4bf05d6cd3b5491e23b100d3669864b917648bfbab55b1b24efc3dd4e42e97925f8662844d8413e78cfce67bd4e94a9ef5fa659a37bda5ae21777c6c3bda0e677f96a0d151b3e5dae032bdfb92a3fc7301772dee208f3633070034951775b35b1e0ea48be7633e1b0609", 0x78}], 0x5, &(0x7f0000001e80)=ANY=[@ANYBLOB="a80000e5bcb62400000000001100000084020000153f0975f68cc29d4c0aa7ed1d4d2ae40b8f7a8132d14f8ab1d6116f787a6d08365eeed27d6136bc19a7d71ec63f050000006b7fce571a97f2a9b3263105bbab435a04b17cb7a97602e7d6c0174f7138179dd802265b77869d3aba6b61b090a1b834b3ef278f1e783e79f199a654744c18d219c89c5d928e9a0d54650578cff6d5a5a561ac73fce79cb6e786000d3601f03ed0f3377d2e7214e17d50138bf72a599b0229a9160ce81f265728787c59ee198fbf4413ec76e028803aff010000ea7b9b217b8a04468f2f17a9493159a3ce1608aef303eff9bbae0230ec28f4da3313e398d2abc8619bcce1f3040f47d1cd8e047154fea5e0"], 0xa8}, 0x804) write$P9_RWSTAT(r1, &(0x7f00000006c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000740)={0x0, 0x2c1, 0xfffffffffffffe61, &(0x7f0000000700)=0xc460}) sendmsg$nl_netfilter(r1, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20100}, 0xc, &(0x7f0000000600)={&(0x7f0000001fc0)={0x1014, 0x12, 0x6, 0x101, 0x70bd25, 0x25dfdbfe, {0x3}, [@generic="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"]}, 0x1014}, 0x1, 0x0, 0x0, 0x20004050}, 0x20004001) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000001d00)='nr0\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40, 0x0) exit(0x4e) 11:48:39 executing program 0: 11:48:39 executing program 0: 11:48:39 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x4008660f, &(0x7f0000000000)=r2) 11:48:40 executing program 0: 11:48:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x70, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x70) 11:48:40 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40087602, &(0x7f0000000000)=r2) 11:48:40 executing program 0: 11:48:40 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x801c581f, &(0x7f0000000000)=r2) 11:48:40 executing program 0: 11:48:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:40 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40106614, &(0x7f0000000000)=r2) 11:48:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xf0ffff) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:40 executing program 0: 11:48:40 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x2) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:40 executing program 7: 11:48:40 executing program 0: 11:48:40 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x401c5820, &(0x7f0000000000)=r2) 11:48:40 executing program 7: 11:48:40 executing program 0: 11:48:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x70, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x70) 11:48:41 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0xc0c0583b, &(0x7f0000000000)=r2) 11:48:41 executing program 7: 11:48:41 executing program 0: 11:48:41 executing program 2: socket$inet6(0xa, 0xf, 0x635c) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:41 executing program 0: 11:48:41 executing program 7: 11:48:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x14) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') r2 = getpgrp(0xffffffffffffffff) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={r2, r3, r4}, 0xc) 11:48:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x1400, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:41 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086603, &(0x7f0000000000)=r2) 11:48:41 executing program 7: 11:48:41 executing program 0: 11:48:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x100) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) 11:48:41 executing program 7: 11:48:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x58, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}]}, 0x58) 11:48:42 executing program 0: 11:48:42 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x9, 0x800) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000100)={{0x16, @broadcast=0xffffffff, 0x4e24, 0x1, 'fo\x00', 0x8, 0x1, 0xa}, {@rand_addr=0x6, 0x4e21, 0x10002, 0x8000000, 0x1, 0x3}}, 0x44) 11:48:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x14) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x400, 0x0) poll(&(0x7f0000000140)=[{r0, 0x8080}, {r1, 0x1000}, {r2, 0x10}, {r3, 0x1}], 0x4, 0x4) r4 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r4, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:42 executing program 7: 11:48:42 executing program 0: 11:48:42 executing program 7: 11:48:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x1000000000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:42 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40849, 0x8) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 255.470263] device bridge_slave_1 left promiscuous mode [ 255.475882] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.498092] device bridge_slave_0 left promiscuous mode [ 255.503693] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.578503] team0 (unregistering): Port device team_slave_1 removed [ 255.591335] team0 (unregistering): Port device team_slave_0 removed [ 255.603828] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 255.628658] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 255.713399] bond0 (unregistering): Released all slaves 11:48:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x6003, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) 11:48:42 executing program 0: 11:48:42 executing program 7: 11:48:42 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000003c0)='em1^+\x00'}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000740)=[{{0x0, 0x7530}, 0x100000000, 0x0, 0xaf54}, {{r3, r4/1000+30000}, 0xfffffffffffffffb, 0x1}], 0x30) getresgid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000000, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xad4}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d, 0xc00}, 0x2c}, {@blksize={'blksize', 0x3d, 0x800}, 0x2c}]}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:43 executing program 7: 11:48:43 executing program 0: 11:48:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x58, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}]}, 0x58) 11:48:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) ptrace$getsig(0x4202, r0, 0x1000, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:43 executing program 0: 11:48:43 executing program 7: 11:48:43 executing program 7: 11:48:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = accept4(r0, &(0x7f0000000100)=@can, &(0x7f0000000000)=0x80, 0x3b6d2befa1c4114c) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0xf0, 0x2) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:43 executing program 0: 11:48:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xfffff000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 256.891302] IPVS: ftp: loaded support on port[0] = 21 [ 257.335377] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.341831] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.349558] device bridge_slave_0 entered promiscuous mode [ 257.378773] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.385164] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.392380] device bridge_slave_1 entered promiscuous mode [ 257.416933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 257.442462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 257.510514] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 257.537979] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 257.640932] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 257.648154] team0: Port device team_slave_0 added [ 257.671053] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.678292] team0: Port device team_slave_1 added [ 257.702491] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.729721] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.754906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 257.762160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.770346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.790355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 257.797438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.805428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.022310] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.028688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.035337] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.041696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.048924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.400401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.850542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.929496] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 259.009430] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 259.015621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.023952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.099518] 8021q: adding VLAN 0 to HW filter on device team0 11:48:46 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80000, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x6040004dcfd60284, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000180)="058851370f66f491ae4f122d5a828fd9ab51d7fe181b3a500fd2e2090f048b57732aab5b5eebd405d60bf9e4faa98d771ff3fb19b03bf84602f66cf350fe9d81293f2d0b67bd845f98dfe829423456b0719a1712dd1b803452d76fb8fdcdcad1a42efa3f1621f099c45e3db046ad", &(0x7f0000000240)="b823a8459cc13b81d2441945ac31cee82be604c038234d482ef7"}, 0x20) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x40) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100007fffffff) r4 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x40086602, &(0x7f0000000000)=r4) 11:48:46 executing program 0: 11:48:46 executing program 7: 11:48:46 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x10100, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000001c0)=0x7) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_buf(r1, 0x29, 0x3d, &(0x7f0000000100)=""/104, &(0x7f0000000080)=0x68) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000040), &(0x7f0000000280)=0x4) 11:48:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:46 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1d243d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xfeffffff00000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x58, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}]}, 0x58) 11:48:46 executing program 0: 11:48:46 executing program 7: 11:48:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000080), &(0x7f0000000000)=0x4) 11:48:46 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000003000), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:46 executing program 7: 11:48:46 executing program 0: 11:48:46 executing program 7: 11:48:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0x6}, {0x3, 0x3e8fb986}, {0xa, 0x8001}, {0x3, 0x681}], 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000001c0)={r0}) connect$rds(r1, &(0x7f0000000200)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) setsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000080)=0x394, 0x4) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 259.848362] device bridge_slave_1 left promiscuous mode [ 259.853980] bridge0: port 2(bridge_slave_1) entered disabled state 11:48:47 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000001c0)=0x80, 0xffffffffffffff03) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100007fffffff) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000180), &(0x7f0000000240)=0x18) openat(r1, &(0x7f0000000100)='./file0\x00', 0x1, 0x0) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x10, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000300)={0xa, 0x0, [{0xfff, 0x3, 0x0, 0x0, @adapter={0x0, 0x4, 0x0, 0x98}}, {0x8, 0x3, 0x0, 0x0, @sint={0x7, 0x7fffffff}}, {0x1800000000000, 0x7, 0x0, 0x0, @sint={0x5, 0xad}}, {0x7fffffff, 0x4, 0x0, 0x0, @adapter={0xfffffffffffffff8, 0x10001, 0x3, 0xfffffffffffffffc, 0xffffffffffffff01}}, {0x0, 0x3, 0x0, 0x0, @msi={0x9, 0x7c2, 0x152}}, {0x8, 0x2, 0x0, 0x0, @sint={0xff, 0x1}}, {0x7fff, 0x3, 0x0, 0x0, @msi={0x9, 0x6, 0x2e5aebfa}}, {0x5, 0x6, 0x0, 0x0, @msi={0x3, 0x2, 0x10000}}, {0x15863bd1, 0x3, 0x0, 0x0, @adapter={0x5, 0x9, 0xb6d, 0x0, 0x8}}, {0x401, 0x2, 0x0, 0x0, @irqchip={0x5, 0x8}}]}) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x5f, 0x440000) 11:48:47 executing program 0: 11:48:47 executing program 7: 11:48:47 executing program 0: [ 259.891098] device bridge_slave_0 left promiscuous mode [ 259.896686] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.035591] team0 (unregistering): Port device team_slave_1 removed [ 260.053879] team0 (unregistering): Port device team_slave_0 removed [ 260.066930] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 260.071859] IPVS: ftp: loaded support on port[0] = 21 [ 260.086216] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 260.115131] bond0 (unregistering): Released all slaves 11:48:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000000), &(0x7f0000000080)=0x4) 11:48:47 executing program 7: 11:48:47 executing program 0: 11:48:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x1000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xf6ffffff00000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:47 executing program 7: 11:48:47 executing program 5: 11:48:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2b76479d05421b15ce41c0ad827e668287af5d608a532ed8612a6eecbd"]) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0xfe66) 11:48:47 executing program 0: 11:48:47 executing program 2: syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffb, 0x204200) r0 = socket$inet6(0xa, 0x2, 0x0) fsetxattr(r0, &(0x7f0000000080)=@known='security.evm\x00', &(0x7f0000000100)='/dev/adsp#\x00', 0xb, 0x1) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:48 executing program 5: 11:48:48 executing program 7: [ 261.070191] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.076639] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.084553] device bridge_slave_0 entered promiscuous mode [ 261.125664] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.132169] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.139520] device bridge_slave_1 entered promiscuous mode [ 261.178197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.217348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 261.333908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 261.376121] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 261.555252] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 261.562752] team0: Port device team_slave_0 added [ 261.602802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 261.611154] team0: Port device team_slave_1 added [ 261.663955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 261.710072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 261.717006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 261.726340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 261.749060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 261.756276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.765850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.797161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 261.804486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.815264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.083204] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.089589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.096258] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.102618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.110050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 262.752213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.914769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.993326] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 263.071227] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 263.077480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.084556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.161394] 8021q: adding VLAN 0 to HW filter on device team0 11:48:50 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000180)=0x14) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x1) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40000, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100007fffffff) r4 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x40086602, &(0x7f0000000000)=r4) 11:48:50 executing program 5: 11:48:50 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x8) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xfffffffffffffdab) read$FUSE(r0, &(0x7f0000009000), 0xffffffffffffff8d) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) sendmsg$nl_netfilter(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="9c0000000c00000429bd7000fbdbdf250d000000740006005a7689e3ba5f108969897cd339bbef88d4d964d0f094a44013527cc7963f9e02f3542278a45209bd8ab96b518278c6974ab1b5130b4996e14177a8ad1bf96528198fd8fef75210ae83963b59a70c2a96bcb50b3ff19f18a4dc894141dcc0fb6bfe68e0d82f40b4ba4acf3f9924527e0014004900ff0100000000000000000000000000012f7142cf94128d5196e7b99e57f125417d6426b0b653c22f14c22d64d661ca61fc29806643a27d8954757b22ea79ce14f1abfb1cc2599f2e781e7c20c2"], 0x9c}, 0x1, 0x0, 0x0, 0x1}, 0x4000854) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) mkdirat(r0, &(0x7f00000002c0)='./file0/file0\x00', 0x4c) 11:48:50 executing program 0: 11:48:50 executing program 7: 11:48:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x400000000000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0xfeffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:50 executing program 0: 11:48:50 executing program 5: 11:48:50 executing program 7: 11:48:50 executing program 7: 11:48:50 executing program 5: 11:48:50 executing program 0: 11:48:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x0) fsync(r0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)={0x0, 0x45a, 0x0, [0x8]}, &(0x7f0000000240)=0x1bb) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e21, 0x9, @loopback={0x0, 0x1}}}}, 0x84) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:51 executing program 7: 11:48:51 executing program 5: 11:48:51 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:48:51 executing program 0: [ 263.910045] device bridge_slave_1 left promiscuous mode [ 263.915673] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.957845] device bridge_slave_0 left promiscuous mode [ 263.963501] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.097339] team0 (unregistering): Port device team_slave_1 removed [ 264.105759] IPVS: ftp: loaded support on port[0] = 21 [ 264.111660] team0 (unregistering): Port device team_slave_0 removed [ 264.121832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 264.136742] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 264.165560] bond0 (unregistering): Released all slaves 11:48:51 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72326d6f64753d303030300000000000000000000020000000001e3855750125217a99a5ec908886e1cd2f22649625efba5ce7f9b72f5b0242bb4963f482b57f2bf889f1fb60c3ba2ed393ccfadc6563a9fe7b04a71bfae49e38eafbda9e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000002c0)={0xffffffffffffff9c}) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000400)=0x1, 0x4) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x40000000004000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x80) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0x42, "fa86c72bba33c4bd956747627bc1e6759a5c3265aaadee29c94d5e0f7cbe67056978e703c16b73bc74a80e1e50454c546c16a371aeac17bd9c14a4d1b54bd1df4b2d"}, &(0x7f00000000c0)=0x4a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000480)={r4, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x7f, 0x6}, 0x90) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000080)=0x3ff) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:51 executing program 5: 11:48:51 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x410002) getsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000080), &(0x7f0000000000)=0x241) r1 = socket$inet6(0xa, 0x80080803, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x7, {{0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x1a}, 0x8001}}, {{0xa, 0x4e22, 0xb66, @remote={0xfe, 0x80, [], 0xbb}, 0x426}}}, 0x108) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r2 = semget(0x1, 0x1, 0xc14e1e642154cc96) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000180)=""/90) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:51 executing program 7: 11:48:51 executing program 0: 11:48:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xf6ffffff) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:51 executing program 7: 11:48:51 executing program 0: 11:48:51 executing program 5: 11:48:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x1, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x100050, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',version=9p2000.L,msize=0x0000000000000009,cache=loose,cachetag=,cache=loose,dfltuid=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=r3, @ANYBLOB=',access=client,cache=loose,access=clieot,\x00']) 11:48:52 executing program 0: 11:48:52 executing program 7: 11:48:52 executing program 5: [ 265.146551] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.153064] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.160566] device bridge_slave_0 entered promiscuous mode [ 265.201743] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.208249] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.215717] device bridge_slave_1 entered promiscuous mode [ 265.255488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 265.295477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 265.416447] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 265.463563] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 265.671400] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 265.678888] team0: Port device team_slave_0 added [ 265.716254] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.724203] team0: Port device team_slave_1 added [ 265.769067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.817529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.824694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.832610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.863116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.870319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.881529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.915676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.922790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.931954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.152559] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.158944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.165610] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.171990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.179645] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.848449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.984465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.063054] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.141951] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 267.148174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.155308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.229908] 8021q: adding VLAN 0 to HW filter on device team0 11:48:54 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100007fffffff) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000100)}, {&(0x7f0000000300)="4796316eda326c1d04894a52485c7f6f1092d4178e21a2f8cbdf77dc087158d73d291671fb8a7e24187979f30541f07b25056c6f834d8733e1f8d471976db0dc0b396cb63f9bc80e308164943f77bcdf6c65a9d966086ac3e257f52822d9cf2157b428bbb72e287187bc6d7448e92b947432d0f6acfbfb5b2167b8fe98776325e574f225803dde2b259323e53be0e2bbdf236d593dfb5be670a6cd73a6bf33e660205189b6ec54d5b49a1849ca4c5ad5115fa576f93002986aa3ed1dd2acbaa057bcdaae82fb16376dd80b6ceebff0ba0e9a10b5ab1b539be1c16a0f095ffa09807dc7106d316ca643c0e4676c599d7344d5a0bb622c81fc72a9fc402e", 0xfd}], 0x2, 0x0) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) 11:48:54 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) accept4(r1, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x80000) read$FUSE(r0, &(0x7f0000001000), 0xc84) socketpair(0x11, 0x800, 0x1000, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000340)) read$FUSE(r0, &(0x7f0000004000), 0xfffffffffffffe7c) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:54 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xdb4e, 0x406042) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:54 executing program 0: 11:48:54 executing program 7: 11:48:54 executing program 5: 11:48:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xfeffffff) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0xfffffffe, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:54 executing program 0: 11:48:54 executing program 7: 11:48:54 executing program 5: [ 267.751830] QAT: Invalid ioctl 11:48:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bpq0\x00', &(0x7f0000000000)=@ethtool_ts_info={0x41, 0x7, 0x1, 0x0, [0x83b, 0x7], 0x400, [0x4, 0xf0c, 0x7]}}) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:48:54 executing program 0: [ 267.792929] QAT: Invalid ioctl 11:48:55 executing program 7: 11:48:55 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f00000000c0)=r2) 11:48:55 executing program 5: 11:48:55 executing program 7: [ 268.109362] device bridge_slave_1 left promiscuous mode [ 268.114994] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.129799] device bridge_slave_0 left promiscuous mode [ 268.135378] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.172620] team0 (unregistering): Port device team_slave_1 removed [ 268.182622] team0 (unregistering): Port device team_slave_0 removed [ 268.192528] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 268.210871] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 268.239500] bond0 (unregistering): Released all slaves 11:48:55 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x7f, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e20, 0x4, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xa}}, 0x81}}, 0x0, 0x3}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r2, 0xffffffff, 0x30}, &(0x7f00000002c0)=0xc) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) r3 = getpgrp(0x0) ptrace$setopts(0x4206, r3, 0x80, 0x20) 11:48:55 executing program 0: 11:48:55 executing program 5: 11:48:55 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast2}, &(0x7f0000000180)=0xc) r3 = accept$packet(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000240)=0x14) r5 = accept4$packet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000300)=0x14, 0x80000) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000340)={@loopback, 0x0}, &(0x7f0000000380)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000780)={'syzkaller0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002e00)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002f40)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000003040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003080)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003b00)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003b40)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000003c40)=0xe8) accept(r0, &(0x7f0000004000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000004080)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000004380)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f00000043c0)=0x14) getpeername$packet(r0, &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000004440)=0x14) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000004480)={'syzkaller1\x00', r11}) recvmsg(r0, &(0x7f0000004880)={&(0x7f00000044c0)=@can={0x0, 0x0}, 0x80, &(0x7f00000047c0)=[{&(0x7f0000004540)=""/88, 0x58}, {&(0x7f00000045c0)=""/41, 0x29}, {&(0x7f0000004600)=""/208, 0xd0}, {&(0x7f0000004700)=""/42, 0x2a}, {&(0x7f0000004740)=""/127, 0x7f}], 0x5, &(0x7f0000004840)=""/35, 0x23, 0x400}, 0x100) accept4$packet(r0, &(0x7f0000005fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000006000)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006440)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006480)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000006580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006640)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000006740)=0xe8) accept$packet(r0, &(0x7f0000006780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000067c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000006800)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000006900)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007d00)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000007e00)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007e40)={'ip6tnl0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000007f80)=0x27) getpeername$packet(r0, &(0x7f0000008580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000085c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008600)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000008700)=0xe8) accept$packet(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000005c0)=0x74e469acabf0d491) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000008cc0)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000008dc0)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000008e00)={@loopback, 0x0}, &(0x7f0000008e40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000009140)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000009240)=0xe8) accept$packet(r0, &(0x7f0000009280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000009300)={0x0, @rand_addr, @dev}, &(0x7f0000009340)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000a5c0)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f000000a6c0)=0xe8) getpeername$packet(r0, &(0x7f000000a9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f000000aa00)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000b800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000010}, 0xc, &(0x7f000000b7c0)={&(0x7f0000001640)=ANY=[@ANYBLOB='L\r\x00\x00', @ANYRES16=r1, @ANYBLOB="000028bd7000fedbdf250000000008000100", @ANYRES32=r2, @ANYBLOB="4402020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff0300003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000034000400008007070900000005000006060000000104c8ecfdffffff0600fc1f40000000fcffff000800000002001ba70900000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000900000008000100", @ANYRES32=r9, @ANYBLOB="e80102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000f68b00000000000000000000000008000300030000000800873bf3db5ec125397c8c0216e6a3280a2ebb94c831267cc0dac8a890e9887d8f5247345d9cf82ec0c8120e15ecc8cb351e1db4bce9e0cf1b6d06ab7c82e27126849aebf0bc63cb27df48adc06646050bc11483c3587ad823a677cbcd8b3265a342e18167e5b086f36c878aa3ce1fe94888e20fa98ab9a99af4af3c1d30487b9afddd4f5adc86233aa9e9c58f3919f6bcc5752bcbaf8da61557dce1afacef71a88f5f27bfe99144bb27992d1bb371d6784d450d8fac7b000000000000000000", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r14, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004001f00000008000600", @ANYRES32=r15, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400020007010100000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000800000008000100", @ANYRES32=r16, @ANYBLOB="1c02020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400080000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000300000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000800000008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004005805000008000600", @ANYRES32=r21, @ANYBLOB="08000100", @ANYRES32=r22, @ANYBLOB="c000020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000008000008000600", @ANYRES32=r23, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ff01000008000600", @ANYRES32=r24, @ANYBLOB="08000100", @ANYRES32=r25, @ANYBLOB="f400020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400200000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r26, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000014000400c7b0090000000000060000804d01000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000080000008000100", @ANYRES32=r27, @ANYBLOB="3402020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400090000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r28, @ANYBLOB="40000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100008008000600", @ANYRES32=r29, @ANYBLOB="54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002400040000003f0004000000ff7f040835600000020001000004000005000300040000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r30, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400040000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r31, @ANYBLOB="3c00010d240001006c625f74785f6d6574686f64000000000008000300450000000c000400686173680000000008000100000000000000000000000000000000", @ANYRES32=r32, @ANYBLOB="cc0002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000700000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400070000fd02000000000001ff090000000100860100100000020005fc1000000008000100", @ANYRES32=r33, @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r34, @ANYBLOB="640102003c00010024000100656e61626c65641f0000000000000000000000000000000000000000000000000800030006000000040004000800060066924132d8f5c6c63e61ac52b0ab6f47f78f83d87a91b678673a3699cd5048c18aeb000000000000002e95d0907f0353afaa03541aea91be399888db065b83d97559c210db8b254b44d620be0a1f9e72a20d4edb", @ANYRES32=r35, @ANYBLOB="6c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000003c0004000800815a050000000104ff06070000000500080403000000e20809ff01000000020008ff04000000010000ff40000000050008030500000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000180000008000600", @ANYRES32=r36, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004003f00000008000100", @ANYRES32=r37, @ANYBLOB="4400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r38], 0xd4c}, 0x1, 0x0, 0x0, 0x40000}, 0x8040) r39 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r39, 0x0, 0x100007fffffff) r40 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r40, 0x40086602, &(0x7f0000000000)=r40) 11:48:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xfffffffe) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x1000000000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) 11:48:55 executing program 7: 11:48:55 executing program 0: 11:48:55 executing program 7: 11:48:55 executing program 5: 11:48:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x10000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x2, 0x3, 0xb4, 0x0, 0x10001}}) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100)=0x1, 0x4) 11:48:56 executing program 5: 11:48:56 executing program 0: 11:48:56 executing program 7: 11:48:56 executing program 0: [ 269.069803] IPVS: ftp: loaded support on port[0] = 21 11:48:56 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:48:56 executing program 5: 11:48:56 executing program 7: [ 269.840658] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.847064] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.854234] device bridge_slave_0 entered promiscuous mode [ 269.880137] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.886546] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.893813] device bridge_slave_1 entered promiscuous mode [ 269.919221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 269.945352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 270.017143] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 270.046175] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 270.073170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 270.080116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.105911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.112815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.182576] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 270.190404] team0: Port device team_slave_0 added [ 270.214959] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 270.222177] team0: Port device team_slave_1 added [ 270.246876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.275000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.300720] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 270.307763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.316230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.336759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 270.343960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.352325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.577171] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.583660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.590300] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.596680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.603952] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 271.073519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.425172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.503868] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 271.583750] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 271.589928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.598288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.674717] 8021q: adding VLAN 0 to HW filter on device team0 11:48:59 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, r0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100007fffffff) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') 11:48:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x2000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:48:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x8, 0x4) 11:48:59 executing program 0: 11:48:59 executing program 7: 11:48:59 executing program 5: 11:48:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0xfeffffff00000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:48:59 executing program 6: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) r1 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0xffff, 0x400) dup2(r0, r1) read$FUSE(r0, &(0x7f0000003000), 0x1000) syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x200000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_ii=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r2, &(0x7f0000001000), 0xc84) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x50040, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="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"]) 11:48:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) socket(0x9, 0x3, 0x2fd) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100)) 11:48:59 executing program 0: 11:48:59 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x82) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0x0) 11:48:59 executing program 5: r0 = socket$unix(0x1, 0x8000000000001, 0x0) r1 = socket$unix(0x1, 0x20000000000001, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000c00)={0x0, &(0x7f0000000bc0)}, 0x10) 11:48:59 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) read$FUSE(r0, &(0x7f0000003000), 0x1000) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000080)={0x3, 0x8, [{0x6, 0x0, 0x8}, {0xee7c, 0x0, 0x6}, {0x8, 0x0, 0x2d80}]}) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={r3, 0x6, 0x1, 0x3, 0x1, 0x3}, &(0x7f0000000380)=0x14) 11:48:59 executing program 7: r0 = eventfd(0x0) ioctl$TIOCNXCL(r0, 0x5450) 11:48:59 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000), 0xc) 11:48:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000640), 0x4) 11:48:59 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e21, 0xffff, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0xfffffffffffffffd}, {0xa, 0x4e24, 0x9, @loopback={0x0, 0x1}, 0xb8}, 0x101, [0x3, 0x401, 0xd111, 0x8, 0xf8, 0x1, 0x9, 0x7]}, 0x5c) truncate(&(0x7f00000000c0)='./file0\x00', 0xffff) r2 = open(&(0x7f0000000140)='./file0\x00', 0x80000, 0x40) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 272.528748] device bridge_slave_1 left promiscuous mode [ 272.534454] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.553476] device bridge_slave_0 left promiscuous mode [ 272.559136] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.598762] IPVS: ftp: loaded support on port[0] = 21 [ 272.622079] team0 (unregistering): Port device team_slave_1 removed [ 272.634645] team0 (unregistering): Port device team_slave_0 removed [ 272.644855] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 272.663671] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 272.693636] bond0 (unregistering): Released all slaves 11:49:00 executing program 7: r0 = socket(0x1, 0x2, 0x0) ioctl$TIOCNXCL(r0, 0x5450) 11:49:00 executing program 2: r0 = socket$inet6(0xa, 0x80804, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x200400, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x7, 0xffffffffffffffe1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ip6gretap0\x00', 0x0}) write$9p(r1, &(0x7f00000003c0)="2cd4bcff0b747df87dbbdfbe698ae7d39011396bbeafd5620acaa55383e58bbe53c2c54f2bfec69ba5f4016a95ceeee7404d26bebcf4602ad2189aa16ffe9964076688ec88855c34aad0a9dcb91e4351eb2f5b6cc0fcc1ec28e63fd3049bdc41a53ec0cfe37b55736b10b690ea813346911591659c458d0091d1f6cced19fba16484b17a974a4e98c1b71b20496bad047fbf6084d3433e0da6c5670c61b5b114765a5718222a67cd04a889ab8156a61aafadf0889292960f1635c579a4dadc98c677d93e261de04dcbaee15bca8d8695c780ba0bf5c6675bc69528ea364714ff281f81adf1ca87e9e860a26d94b2fad62bdd66", 0xf3) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r4, @ANYBLOB="140006000000000009000000000200000000000014000200000000aa4f931a0e63e429f11b3c80e5708b0512a10a9668525e6723b0effa4e99d4be00866299d47b346bd269c1334c14a8b428bedf8c8f0f27a8834e489b9321c3b9d77333f8de2b2fb79e140da2663052508d10bb5ecc3043b0af929c14d15c65e14a9765302e637fd629bc34c3081b13e3339dfdb616486cf255805b092668bc0c54092ce2ff276e6d825c7757cfd6fc2fb211fb7a2a866d126e21af12d8a362442b6cdf228819844fbcfcea00"], 0x40}, 0x1}, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000001c0)) connect$packet(r3, &(0x7f0000000080)={0x11, 0x3, r4, 0x1, 0x4, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) socket$inet6(0xa, 0x2, 0x0) 11:49:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000180), 0x1a5, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="51dcb93d", 0x4, 0x0, 0x0, 0x0) 11:49:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:00 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000a9cff8)) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) gettid() 11:49:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x2000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:00 executing program 7: 11:49:00 executing program 5: 11:49:00 executing program 0: 11:49:00 executing program 5: 11:49:00 executing program 7: 11:49:00 executing program 0: 11:49:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = accept(r0, &(0x7f0000000100)=@nl, &(0x7f0000000080)=0x80) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x15, &(0x7f0000000280), &(0x7f0000000240)=0x9e) 11:49:00 executing program 5: 11:49:00 executing program 7: [ 273.730394] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.736838] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.744357] device bridge_slave_0 entered promiscuous mode [ 273.783754] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.790228] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.797748] device bridge_slave_1 entered promiscuous mode [ 273.836654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 273.875362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 274.007425] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 274.069412] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 274.238944] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.246220] team0: Port device team_slave_0 added [ 274.298975] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.309175] team0: Port device team_slave_1 added [ 274.345936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 274.352887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 274.361248] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.389857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 274.396878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 274.405404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.443410] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 274.450570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.458610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.479116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 274.486271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.495183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.748518] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.754894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.761529] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.767887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.775241] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 275.361121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.596201] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.678939] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.758682] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.765098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.772355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.847393] 8021q: adding VLAN 0 to HW filter on device team0 11:49:03 executing program 7: 11:49:03 executing program 6: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x0) mkdirat(r0, &(0x7f0000000340)='./file0\x00', 0x5) timer_create(0x7, &(0x7f0000000080)={0x0, 0x2e, 0x4, @thr={&(0x7f0000003000)="2f62fcac18775e3065c6d3c8c74a9493e299aa058422979ea22cc320e25b7a0ff87f1fb414b1f8b986a204da0256914c512bdcdbaf50ee0fd73b00805399f8cb30592ca0016c949cc1f06e9de15daa91c2681f8ad8200a1671bcc9de33b5b7bc439c949439a363e202960dc163683f59cb8ef3611c0c7e6c826850e6e5529f36f1d8540dd08932d9c1d9aa251cb0353784ab32adebb5ca4ef90bd5b2e611e6dc4d544b482311f6bea524efc11f60607798102764984a52acfe58ba2232d941cb101c87f21d2302c80d310d205a0ae8071d3ae70c1a79a549730c2dd4b9269e40d97332726ba5825439c4859ef8ddf93088dfbe7804b9e3c90bc2f17dc0e7be18536707daf267d086bbc310dfcc16e54bf3eca02bdf9656f3d30a09694fb4e734243a983839505d49440ff6ecdf30a044a4db6d5d02ba22b70f16e3f8dbc713bab2a84f8202a35cdc53ae67fe234db734564508693c4479e8b94ff8ee8f144d34443e5f2015d3b525ac5a844e26b30ab3d649ef75cf72a4ebeca5a1d5d515e3c33af97d49877b8177bd4b8fdc3558cf2043982d01777ad886213b248e231ea3b39ab126677c6d0f51cd540eb08bd66b8e9c84a29e4334c7f70577f757163eea909d5ab08b19d8682a968585ee2855daf4cdb6847c1a12601344b576c462215d7ac9b5d216e2b4128baab0ace38fdae3c0320a24c653de51713294fc4b43eb09f7b2db432873d974041622b741135d9918b8145d1b027fb3ff7ad362bb3894c40bff8195e9b9c7cdb6e46e3cfba01c3a563bc7d1b69dcc14fc712c749b64a4c5dc9197699bbf07d55ddcf60abb5de6f3f0187593c0b749d221363b497d1ee16ce69653f220e19a74deae8d18c03923a730cdee44e342ac725751707b66aaa1c20333f6fd0327c72b2b8df080a32c666235ef16d52d9a768b59b3bdcce3752e24ff796f392f6d0b179a7790d906ebcdb0651bb93bff878783810e963241664393ae2a3019db41a716ca8e12385bc05597b61e90bccd979745ea93e66c6a41c88ccbcd22c354054ceb21edefdb92749759e126fc62beccac030c977f6392f476b630147e5347d74a9df69522551caba363a107d93fdc73c586735dd145ea1a5528aa3540077a3f0548c03088f4bcc6219ce145e68daf625e1041c21142f5213f5c14c96d3a3c5b1f214dc1f7cb6c785dd44ebb4f0f6d55a2d0e020cd73cba21cff46581f4f862888cf8de4461a1694032c5fd2377fd1b7378e48e9b8f767752158cc6b65267e339ff6b666485c5b964be567dea15400be4a7f3a4170e95b6b402114dd3e99d7d0f753de081abbef302d627b4582d87573e6f4d1e9707e681a3901f4a37bd951d33cac30dc92e559f570f769f71aa6e84de69203702fe70d71a419d1af9cda4448190f023623c2a2c310e9cf63fb233bceded30d5d117efeb1174af4934c63df2bdcfed160a530ef69600453b5b71d967b9f41a26e8d7a6c5b963400fbb86558b4dbf01cf8e2bf6d3ff44af660b9bc218c9f198d75a64c57de239b669718fd706475eabaf16ff4d2cf05ff8f1fee338d1bad9154e2be420e5882558629ff788347caa7e703d70f87293c35b85bb53b5205db874a61470253ab580e2ce16820389984ee73b625b49884b07793943c1bc44b489c67e3dbe4c1ff5c2777fe483c130793a75b314c2b47425e30398971ff5021a21889195298d9d09d13f9cf37a3ba10e7c5a35e0231b88cc26acee2e85e1cfe4594fea057f990fab7742a5ff51eceb079111ff4f0d31474d3d908e884c975bad373c2bf020638d1e80f633f9d2a9147e5784b9d36176acb617c66adcf4ceb66af5d0c6893e79632fc0e2f84ce935f3d916ad0b4a7e93ac1f24c5291b885fdf0f9c68403654d0036ccbf1819230ec26d78c1067c5139c1ef3705c162fad6ca1d6781813a5402e9488635140e72350bd7b8a4277738dbeeb2bb235d6068dceb48ce3d04b848c129dd51e66bf862307b584d9bb8d25604c874483a54136f178296aac5b184f91ad6d7e1c54100cf7977e36c965e5fae475d1fd4aae2c60eb692b5d874c729a517ce6442a58959d9f727d8f030fdd034682cddfdfde6304e095af29f2fae5c566aa6d9e58fd534096791bbf4fcfb47fdb38fdbe01f53cbb3f5dc182fb45390dd4c3e5495e8b747815c996c0eb27bdd7bf13765346455e517139d783bb762bb1c9f32a3cd5520e287201f2813e0399f4decdd07296606492ab7e045cf94daff9cb55adedac4fcee6bfccd16fffcfca7c50711101f9b23133d5edca141861f17fa4fead93a2b980ec6da02a61b38e2276a436b494ddaebcb2b08b0ab195a12b4f1a43684e6bc1f15c6c191c639eb36e677b6011d27484624b584bd1a72da115f1faee2eb0faed26c11df7bf78065b72079cbeadbd770e42f345c942474c1781ca1bca0df745bd3e23f91fd5c5dbf779f382c400b9afa003f942cfc025f3a9244d2881485ec29de4f5087a2dfe012e6d410efee575078241250cdb2d9585cdfd62bbfb3eb02581d9b08c7fc70c08ae59fbc248e9d85cf722846d17d3c8597cbcd7655c2d4792d338c89d123843dde1565edd42cf50e9c380940a31f64bc12819198dde7947b53c5fb67f9675a56ee88cad3b02a2eb7e3ac80b8e1b7a189c2bcffaefed9f92082dac03dcea5c21a8c24562f641b4b55a1d9675ab141b20328a0750f017668587c5eb95e8a464215e90fba9d2b6629d1394dd79ac3b18b8cbdee9b3477eccddd3f626a3278f235dc78576298e09d1af0d111cc43dbfce37902a00c2262137111eb7e576440344cc89b38b1f7906e5b02d1bb3cbe2adacc996178bf60610992f105f3636f0f854a9e180de8499afd5cbf403d4e66d31d4da59197dfefe6c6cf1c9279f38bc7b11f70b6bb8d1e88df8796e41f2b519a7dd4e488b38bb68a88d1420e284c1f6ea96d6c82670036a233bfd1605e8295e3c3c3b4ec3b6ccf93ae1184e3d04270d25f1361b8597f4428b8c8b4ce1f79f04412970faa7e66171104bf166e2a2ddd524dc55305a037f1e5630d5d7568f2d3da46e1797c4841f56108e9a17683618779da54923cc8ee62ec089fce5ec589713fcf15d7f0e9ab6ff80a41eece28b9d468dab1878965b4a345880c6900529fc80f1a33bcfb9051b283b9d74688dfd7a74581181b5b2a0b508eab604bfcb7a96015eb4ea7db5029552e15551822e682fd4ff013b7cf48f076627f31da372aa9e82c2af725b0772c962b850d0b92ad4e2de2cb9eb25cb210aad9c29d4001c1ad501feb26e0e8d25d49be6753e26ac75ebd4ff6da945c27ecb7f69522cb434dbc791c7109a8fec739884a281fe9afafae0938c3a4d59ac04b5bbeeafe8aa8f5211022acb770408e843ef713bb21d2692740edb4d222f5493a8aa5af8a8f899770ff5a8ed25d1fd2168db3b9dc3a9101f1c4f75f84c08fe2351622561685da80c305a7de976613cd60cc4a8183f3945a2c82d89a260360babc5c9927c1249a4fe09a8b096373438913b27c3fa88e44c1906d6ed234c0e051bfb6cece0f7820f03989e8f88540bcd0390cc6f604dca9b61633a6570038b695ee54bc57e68e65f98145aedb7dd1a66b7d6862305c713ca25d21da6206707c130f0c344676de1c5ef02a2ac544a15268d472bd4bd389bf5826ed856cb4c21899caedb81a6a259ea68588971b903c0d1c884dc1898728bfa7bcccfe660f21b6e710d485a7e86026fd1582278568366c79b032228e0790039b81e8c2411c6d2bcdad0c1d7fa9a040febbc1bdc1995bd68000c51377f198b7d6b7dfa8c8fa55c52009b9c0738a3c981397d588ba1471fbfcb2c9c434dbfa561df09564ba3f4fc092128885133552120e4b719470a9d082c6d1ce60593d304ec82c32e8505d69147b7af8168a9d1df737946bb4504cb109224721beb77086fb8178b3633c8ac208ab33251465c563a232275603bb2ff0226205e75efd45b4b61fcee91f5f6207365b0fc2f06e995cc4dc6b6d3b0d1e0200cec692c60b8cffbdf30636ab42e1a0cb5db9621e1e96d04168b93cd8d3138f1342eff8020d328c0c20a4d579aad36084fd92eaccf363bf52688fe9f6f68cbf98e27e3c5a92b37a0d752bf74dc538c4e87c238af5c0cf0852b0eca0d4e822054089176b74716214679ebb0ab89856f583c238f75b364235e6734fd350b271f91cffa854e1e05c3aeb471cd0982d90ae32475870b4c2be84ef772d13411b2b7fdd44d10a9c403407bc394e392567929f19bd51777debe8c7c8bfc786c0bbae7d3b2b092db1f3c42e1fe8fb8cca3910dc933f386a78d53d4b06be861f91faa39e9069777da6985859bdceb500f129bf8fabdebe9f0e2021e00397b959f383d3a5914a0d8b0198fddd1d544ad93f6fceff54c0849461d583aceff67cee2e31839d7004697f5922fa4086589c6094d90cc9250197ab50e99c98868d6653b0f77c7acb0165f51a2864a061af89694bfd6608d3a8efb282d071cfd9fd9f56bd92678a2dbcefe1d5c84a8e61799e710d88ab3a9e0a76d086de9600baed27522648d463120b0ff980e25e02dca33f4e3a5fd327e02cd32efbc940833801ca43550063fd27e27a7affbb53c120715fef545d89564d8b50ee8946e0740577fa0cfbbfc2681f198364ee6f83a09d7f9e704fbb10739d45e4caa13c305d42b6be8446deaa0cd84508fc9e53cf9368f654ebdad0496330a2f2fc90dcea6a67094049709af942557dad1ff94c5170a930c9a2aa50ece8210b4224159eb5f514b2bffe2a8c21d7219be2434cd25c7f2e67aadf2bb9f38c48a32a7ee51e859d72aeae9f1bc3ca2e2c2ae9f5a9959e53b7547686b213ffb2d5dac45563b485287ccc1cc57769ff67d6993bb5bd0fcf2ec2df344b999e3232e7e61f0eff6b998bf61ab577452017be7c8e0379deb86aa2215ec3a0fdfaa85960a4f6dcece4a1b06a6b8c3644c61f6c095f682dc1ae444df963f918098ec54b794b6c6f3bcec4a6720c1233d87762c9df65f6c45fec5a4812c081b3a451b5452a5710de9a31a46a13ec53ee22c0b52d724599c6aafe761ca55e8656b1d78ddc5331b6bdbf5cd7bf0a96099607055027a801ac8e3dc4e3a7a4b64266b1023a1300a6f52b0ae213192f71b78a5d58cd28132a39f417dacdd5de103f8a383b68b41759055a19891e623eb5863bdace5783f6c021d0163e78436b28ae9fc9db52760deac9f716ca76a2ea71ae6a0a86b890fde366c6ee6192a37dc6a65c35456853275b2e9d8b41bbbf253fcd627c1c3ca33651667830faab1fe3937a495151ea3cbf133a53627b51f03088b173977974745bc69911055084025ff4d4d733aacff314f911ebfd327e1d4b98b9b6aa7018f208692c4138855c2520107d1fbc83b101d456367da3f6ed15353913a8fc78b5c7513a5191c1f834800d533a8d4ef6e7965945749590eb81ae1d6fa2dc5714d4b5bfcdacb579131df7306a865ef4905c9db2f9f036d51e38e91e9fc33d25746b592d840be49b8e82b199cee106466ecb6a6df8f4da3047380f8b9c948669e24741f92056a3aee81d875892a0600c24328725e8bcb1ad01a9e04cac711f3ac31ea8f4ba09c343683b20d2b41359baf76fda9b3f077c64a456a7563cc5d0e8561d8aef099f7a6fe7c0ea26cf1ff81b6fa9854761cf4b97b6971ecd9233960c1c801667a809e3e900ce0945a70f6486972c494e1f1bfdc68a7901cf7cb94c413311a68c50aecffacd6041fc7fe45354dda300d927772cadd1115340d587c23fd3412e90d7cf14350d990e74f8", &(0x7f0000000040)="a2a4d1156c48163d7563a89eec9a8a7f54"}}, &(0x7f00000000c0)=0x0) timer_getoverrun(r1) sendto$unix(r0, &(0x7f00000005c0)="d8a763de6e12f3455df7bf9b72afdd150085a7281d6228a7665c4bda89d277fa7591a84d968f12232174d61f4fe9e614a557826a91893f71b257327935b795c7fd0b510a34e4f564b8048d4afea0ad0af9c772f29f456831e6890ff903447c32fc725f92d97a0bfbae92f58d0031a020ae60a2b97af41119eb3f27292cb5e50a5f582ef6c875d8ef91aa873902baed3a10b68c8680c9e2606f9180da523fa000000000000000", 0xa6, 0x20040000, &(0x7f0000000540)=@abs={0x1, 0x0, 0x4e20}, 0x59) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="bf283d", @ANYRESOCT=r0, @ANYBLOB=',rootmode=4000000000000040000,user_id=9\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES32=r2, @ANYBLOB=',\x00']) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000380)=0x4) setxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r2, &(0x7f0000001000), 0xc84) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:03 executing program 5: 11:49:03 executing program 0: 11:49:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x200) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) ioctl$KDGETLED(0xffffffffffffff9c, 0x4b31, &(0x7f0000000080)) r2 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x8, 0x5, [0x7, 0x7ff, 0x1ff, 0x7, 0x8000000000000000]}, &(0x7f00000001c0)=0x12) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r3, 0xbd03c68, 0x3fa}, 0x8) keyctl$assume_authority(0x10, r2) syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x3f, 0x8000) 11:49:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xffffffff00000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:03 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="caa9a0eeeb9163cae18263997a1e1b5417a6c332cfd184a9860ddbb3fb6a3679e3f75df4bd04be831dfaf539cd2159eb7e82f539d040108fca551eda15336320fc192b25552d13948fe0659036935de78aaa4fce840412e61da2cfceb5410989af5a2782c3f7", 0x66, 0x9}, {&(0x7f0000000300)="3f568e5359199297a9205b26e6ddbcdf0f7eef0555159f593b2a8ae728f23da59514dc65f94ab9e556060a0058e737cbd769bd27b6b0cd4ea61814049df7a5e50c01c5bd8c0bcde8aedd7bd70927913c1e299d709cb3cfc9dfe8938d1e72335105447e753894dd454b44b1b473423bdc606adecefa31b9681998b29ba4f985e254d990707f399fb41c19b51be7206d1e2d7c2edced200688fbd7f65ea5f7", 0x9e, 0x197}, {&(0x7f00000003c0)="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", 0xfc, 0x2}], 0x29460, &(0x7f00000001c0)='wlan1\\\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) mount$9p_virtio(&(0x7f00000004c0)='self)ppp0@proc)eth0\x00', &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000540)='9p\x00', 0x2008004, &(0x7f0000000780)=ANY=[@ANYBLOB="7472616e733d76697274616368702c787e2d82673d3078303030303030303030303030303030312c6361636c653d6e6f6e65000030302e4c2c0000000000000000000000001a705747915399e4bbb161377363bcdd7be5ae0da9c8d04e11b5013af528ee74b6c9c83ea3bffc408b3ecc40819925059e84582b802bc2559d150cb3e60ed30a29eaf362300279d4b505bfadb95c5809dbe422fae6bcbd424d90b274b6abfedbba5cb00136016f7d70d954e6b1bbfca43d637602f3c23f35d0706faa9656e3aff0c76afef4d132406f6fc8e675f6f6d550c12228d278fb59e096ce47a79e5dade60bbc42271dfdafa24f2aff58f2181638993f22db1107b0bc21492ddf0d7bf28aac7cab4d30c897d683fd48007d07"]) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) getgroups(0x3, &(0x7f0000000600)=[0xffffffffffffffff, 0xee00, 0x0]) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r4) 11:49:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:03 executing program 5: 11:49:03 executing program 7: 11:49:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x6, 0x1f}) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f0000000000)=0x4) ioctl$TIOCSBRK(r1, 0x5427) 11:49:03 executing program 0: 11:49:03 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'vmnet1bdevppp0trusted:\x00'}, &(0x7f0000000080)="7072d37fbf18fa175988", 0x346, 0x3) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) fcntl$notify(r0, 0x402, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:03 executing program 5: 11:49:03 executing program 7: 11:49:03 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@routing, 0x8) 11:49:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:49:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000000)="becaf622fc905e70cde330e898986c66aa3797ca1fecf8c9098b0ff1daa5185dda84889741caac95a6e64992d3bfe031c567526e4ecbd184eac7b7cf", 0x3c}, {&(0x7f0000000040)="07f7900b344342a1", 0x8}], 0x2) 11:49:03 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x6, 0x4) open(&(0x7f00000000c0)='./file0\x00', 0x40400, 0xc0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = fcntl$getown(r1, 0x9) fcntl$setownex(r1, 0xf, &(0x7f0000000100)={0x2, r2}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) 11:49:03 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006e00)=[{{&(0x7f00000058c0)=@can={0x1d}, 0x80, &(0x7f0000005a40), 0x0, &(0x7f0000005a80)}}], 0x1, 0x0) 11:49:03 executing program 0: [ 276.649595] device bridge_slave_1 left promiscuous mode [ 276.655218] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.714718] device bridge_slave_0 left promiscuous mode [ 276.720291] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.832276] team0 (unregistering): Port device team_slave_1 removed [ 276.838381] IPVS: ftp: loaded support on port[0] = 21 [ 276.844824] team0 (unregistering): Port device team_slave_0 removed [ 276.855760] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 276.869544] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 276.898187] bond0 (unregistering): Released all slaves 11:49:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xebffffff00000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0xdb, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000100)={{0x3, 0xe7}, 'port0\x00', 0x1c, 0x10030, 0x7fff, 0x8001, 0x80000001, 0x0, 0x100000001, 0x0, 0x6, 0x6}) 11:49:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x14000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:04 executing program 5: 11:49:04 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xb, 0x2031, 0xffffffffffffffff, 0x0) 11:49:04 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x1d) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) 11:49:04 executing program 2: r0 = accept$nfc_llcp(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) ioctl(r0, 0xfffffffffffffffd, &(0x7f0000000200)="2fb0799018a38d9c68fd295c9ffd74b754b590d5389ec4f9f75abe4f3ea2cf03d08f48e632cba86cd4f838a23a7f6ca81c5795184f6fbe0707d76f54c4609de44225fe65d0457e97b431e466ff4b5d9612b9856c18f4e15749f7e29ef5fe220b6b1850b50f0176605d0a0a8879f5b833279318f996a70917196ed7c695233725a2f0f4f44bb10f") r1 = socket$inet6(0xa, 0x7, 0x0) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x8000, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000d40)={0x2, &(0x7f0000000d00)=[{0xbe6, 0x7, 0x5, 0xca2e}, {0x4, 0x1f, 0x2b51c198, 0xfffffffffffffffb}]}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000cc0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20010000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x95c}, 0x1, 0x0, 0x0, 0x814}, 0x40081) 11:49:04 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) r1 = dup3(r0, r0, 0x80000) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x18) 11:49:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000003c0)='em1^+\x00'}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000740)=[{{0x0, 0x7530}, 0x100000000, 0x0, 0xaf54}, {{r3, r4/1000+30000}, 0xfffffffffffffffb, 0x1}], 0x30) getresgid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000380)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000000, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xad4}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d, 0xc00}, 0x2c}, {@blksize={'blksize', 0x3d, 0x800}, 0x2c}]}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:04 executing program 7: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40286608, &(0x7f0000000000)=r2) 11:49:04 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{r1, r2/1000+10000}, 0x7fff, 0x2e, 0x5}, {{}, 0xf61, 0x3ff, 0x101}, {{0x77359400}, 0x1, 0x5}], 0x48) r3 = socket$inet6(0xa, 0x7, 0x3a) getsockopt$inet6_int(r3, 0x29, 0x20012, &(0x7f0000000040), &(0x7f0000000000)=0x4) restart_syscall() [ 277.525471] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 21 (only 16 groups) 11:49:04 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'vmnet1bdevppp0trusted:\x00'}, &(0x7f0000000080)="7072d37fbf18fa175988", 0x346, 0x3) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) fcntl$notify(r0, 0x402, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x498b7c44, 0x80) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="ec400210e101080000002dbd7000fedbdf25040004050000000000000009f8000000000600e20c00000000000002000b0002000000fa77dc2af2438617adb0a29482c78193b201b62b23e275c86748989ff38493427c28fa611c9ad962a3050043c3059251ab2bce46a28f9dd187567a4ac7cd24044d13f4146c38466267603d94e11a1733477857270a12a032b90ac377d61d4c2632ff030000000000004235fa7bceba423f1f41c4a4578d7d79ce228c003c2c90c68efc9ff82fe394b6817c460512cca841ff181e93"], 0x40}, 0x1}, 0x8080) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) [ 277.924328] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.930858] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.938238] device bridge_slave_0 entered promiscuous mode [ 277.975688] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.982175] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.989575] device bridge_slave_1 entered promiscuous mode [ 278.031063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 278.075212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 278.253618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 278.305792] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 278.530579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 278.537497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 278.662694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 278.669921] team0: Port device team_slave_0 added [ 278.705712] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 278.713173] team0: Port device team_slave_1 added [ 278.745740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 278.783619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.823630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 278.830794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.839347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.860514] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 278.867672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.882830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.121927] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.128332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.134970] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.141334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.148561] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 279.456140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.929348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 280.009282] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 280.091224] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 280.097528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.104920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.180206] 8021q: adding VLAN 0 to HW filter on device team0 11:49:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) 11:49:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x1000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:07 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x84080, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0xb0, r1, 0xefdcfcc13fe19da2, 0x70bd27, 0x25dfdbfe, {0x8}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd1e}]}, 0xb0}, 0x1}, 0x4000000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034020030725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r2, &(0x7f0000001000), 0xc84) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:07 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x80000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:49:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x4, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:07 executing program 6: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:07 executing program 7 (fault-call:7 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000080), &(0x7f0000000100)=0x306) 11:49:07 executing program 0 (fault-call:10 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:07 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x5) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0xffffffffffffffbc, 0x0, 0x2}, 0xfffffddd) 11:49:07 executing program 2: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/14, &(0x7f0000000100)=0xe) r2 = socket$inet6(0xa, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}}, &(0x7f0000000200)=0xfffffffffffffe86) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={r3, 0x1000, "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"}, &(0x7f0000001280)=0x1008) getsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:49:08 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) connect$pptp(r0, &(0x7f0000000100)={0x18, 0x2, {0x3, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1e) 11:49:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x2}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 280.889306] device bridge_slave_1 left promiscuous mode [ 280.896099] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.923714] device bridge_slave_0 left promiscuous mode [ 280.929466] bridge0: port 1(bridge_slave_0) entered disabled state 11:49:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x204200, 0x0) sendto$unix(r1, &(0x7f0000000180)="1d9a1853b986d10866c2e9e62ad2943e6e23a707af43095cc73bd0f9228dcbf0237b01ab792130cb1de1ecf175970743ea85d8981df674dd3dbded986b9b071f874ef6e781e9fe776c1506beee614e5780bbbd35d96b1ad6dec94d778e46cb6853a94c60e50826a9b9eaaed6ef88a94acffbfe42cf6ec6d1482bac15b0e3a18c54c3173a6129fe927c3150c175637530fef8e7ccdec111204e7675176e642d875aa4661f8bb7ecc875009212bbd9a5f407b9bd1eab2689a68db681", 0xbb, 0x4000, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x2) [ 280.981884] IPVS: ftp: loaded support on port[0] = 21 11:49:08 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 281.006415] team0 (unregistering): Port device team_slave_1 removed [ 281.020349] team0 (unregistering): Port device team_slave_0 removed [ 281.034793] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 281.056413] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 281.102846] bond0 (unregistering): Released all slaves [ 281.511597] FAULT_INJECTION: forcing a failure. [ 281.511597] name failslab, interval 1, probability 0, space 0, times 0 [ 281.522911] CPU: 0 PID: 18302 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 281.530276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.539629] Call Trace: [ 281.542222] dump_stack+0x1c9/0x2b4 [ 281.545855] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.551055] should_fail.cold.4+0xa/0x1a [ 281.555150] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.560283] ? find_held_lock+0x36/0x1c0 [ 281.564348] ? find_held_lock+0x36/0x1c0 [ 281.568428] ? check_same_owner+0x340/0x340 [ 281.572753] ? rcu_note_context_switch+0x730/0x730 [ 281.577680] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 281.582608] __should_failslab+0x124/0x180 [ 281.586844] should_failslab+0x9/0x14 [ 281.590640] kmem_cache_alloc+0x2af/0x760 [ 281.594873] ? __lock_is_held+0xb5/0x140 [ 281.598945] getname_flags+0xd0/0x5a0 [ 281.602746] user_path_at_empty+0x2d/0x50 [ 281.606899] path_setxattr+0xd6/0x230 [ 281.610702] ? setxattr+0x450/0x450 [ 281.614323] ? __ia32_sys_read+0xb0/0xb0 [ 281.618386] ? syscall_slow_exit_work+0x500/0x500 [ 281.623247] __x64_sys_setxattr+0xc4/0x150 [ 281.627489] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 281.632519] do_syscall_64+0x1b9/0x820 [ 281.636415] ? finish_task_switch+0x1d3/0x870 [ 281.640921] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.645861] ? syscall_return_slowpath+0x31d/0x5e0 [ 281.650809] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 281.656181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.661040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.666236] RIP: 0033:0x455a79 [ 281.669416] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.688809] RSP: 002b:00007f6415a0dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 281.696525] RAX: ffffffffffffffda RBX: 00007f6415a0e6d4 RCX: 0000000000455a79 [ 281.703797] RDX: 0000000020000280 RSI: 0000000020000240 RDI: 0000000020000080 11:49:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = msgget(0x1, 0x100) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000300)) msgsnd(r1, &(0x7f0000000200)={0x1, "af11dc42a264dc6d566c447aeff08673f2748df08766919d3e98fb046ee0a56e5b12bfd309aa642cdc19bce1999433f030bcf9c7fc56ba8b8b9dc42ebae6337e07e7dc34e781e9110984b126cde14ee8be17ed1b65ac4bbe930aa938c37e56871bf127fb00a01d7f77413967050d84470f3d2351c3926d0c63a492e6be0ac5c90c10f696b9de8e6e491b4816d68e703458c1f26cd1eae17dfba38568591c284d370782880de50537b693f8d8f5d6f7caeb9d5786b355b7507b6e5efc4d6ff02e"}, 0xc8, 0x800) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfc5, 0x420801) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)=0x6) 11:49:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x1400) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 281.711069] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 281.718332] R10: 000000000000001c R11: 0000000000000246 R12: 0000000000000014 [ 281.725599] R13: 00000000004bbbe9 R14: 00000000004d3170 R15: 0000000000000000 [ 281.732763] FAULT_INJECTION: forcing a failure. [ 281.732763] name failslab, interval 1, probability 0, space 0, times 0 [ 281.744158] CPU: 1 PID: 18312 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #143 [ 281.751520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.760883] Call Trace: [ 281.763476] dump_stack+0x1c9/0x2b4 [ 281.767112] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.772326] ? find_held_lock+0x36/0x1c0 [ 281.776405] should_fail.cold.4+0xa/0x1a [ 281.780485] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.785610] ? find_held_lock+0x36/0x1c0 [ 281.789699] ? check_same_owner+0x340/0x340 [ 281.794026] ? kasan_check_write+0x14/0x20 [ 281.798265] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 281.803200] ? rcu_note_context_switch+0x730/0x730 [ 281.808153] __should_failslab+0x124/0x180 [ 281.812398] should_failslab+0x9/0x14 [ 281.816204] kmem_cache_alloc+0x2af/0x760 [ 281.820370] getname_flags+0xd0/0x5a0 [ 281.824190] user_path_at_empty+0x2d/0x50 [ 281.828351] path_listxattr+0xbc/0x1a0 [ 281.832243] ? listxattr+0x150/0x150 [ 281.835968] ? syscall_slow_exit_work+0x500/0x500 [ 281.840819] ? ksys_ioctl+0x81/0xd0 [ 281.844461] __x64_sys_listxattr+0x78/0xb0 [ 281.848702] do_syscall_64+0x1b9/0x820 [ 281.852598] ? finish_task_switch+0x1d3/0x870 [ 281.857103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.862042] ? syscall_return_slowpath+0x31d/0x5e0 [ 281.866984] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 281.872360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.877223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.882416] RIP: 0033:0x455a79 [ 281.885602] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.904928] RSP: 002b:00007fa5b0214c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 11:49:09 executing program 2: r0 = socket$inet6(0xa, 0x7, 0x2) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) [ 281.912655] RAX: ffffffffffffffda RBX: 00007fa5b02156d4 RCX: 0000000000455a79 [ 281.919931] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 00000000200001c0 [ 281.927200] RBP: 000000000072c098 R08: 0000000000000000 R09: 0000000000000000 [ 281.934468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 281.941744] R13: 00000000004bbbcb R14: 00000000004cfb28 R15: 0000000000000000 11:49:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 282.035704] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.042198] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.066855] device bridge_slave_0 entered promiscuous mode 11:49:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) sched_setparam(r1, &(0x7f0000000080)=0x1) socketpair(0x5, 0x80000, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_UIE_ON(r2, 0x7003) 11:49:09 executing program 7 (fault-call:7 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:09 executing program 0 (fault-call:10 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 282.165251] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.171689] bridge0: port 2(bridge_slave_1) entered disabled state 11:49:09 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xff, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="448747e8ada07358cf795ea087b8f65be023c2d66997d6bd5a68ba7fada9a606e994e2ae811a3102967492fdfda892c92c7b7efa25673fc25c1251227e4206", 0x3f, 0x67140ab5}], 0x1000000, &(0x7f0000000340)={[{@norecovery='norecovery', 0x2c}]}) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 282.221758] device bridge_slave_1 entered promiscuous mode 11:49:09 executing program 2: socket$inet6(0xa, 0x2, 0x0) 11:49:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x180) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0x10000, 0x0, [0x8001, 0x6, 0x9, 0x100000000, 0xffffffffffffffac, 0x20, 0x8000, 0x100000000]}) [ 282.340602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:49:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x9, 0x7, &(0x7f0000001500)=[{&(0x7f0000000100)="6363a8a9bb97624c8d03d7b8b0b2e73382cc30d35fc3a0ee26755349d7ce7742fd2904d6c7441491492a60e9716d5a64cc7cb7c0ec1c3e7b51017862b033799019789a5304b1982e1d2a8e01c0", 0x4d, 0x9}, {&(0x7f0000000180)="bfdce533287260f696d8721bd9ac20ee172aafd791c8f6a9485be7dbf071b2788e1218a1ed6b849594678cbcb4f1db0bdb28b4176303e165d180aedef8d357360bb779fa2f71e96d62883ae307eb4e0079ef0010d4b47ef190f1545f341d90546dc4390cc4e6f1af49cdcd32b6019c846aff75381e53ccc793ef57a15a74f845723936fd5dc88fcd20fbf64c9578e6981c667c8b692d61fd2e51ebe4bef0eabd61b7ab89b5dacbc08784bfb727a511e23df3478b82e97031", 0xb8, 0x2}, {&(0x7f0000000240)="9dcaaeb63fdf7289b1559a4a1ebf4ad715b3eede248cacff1d0c0c27653dc15e453fda6438796d523b9632d453ea560752e411dd156a7683d38a8647b66b302312508f29fc7c84cb74b04156785d2834463d062ecc14c0afdd75b2edccf9cec6148305a561549cd327b02ada4ab4c59576c5efd887afe447210f3f676aefb27cb72c03c48673f18f2ea6b2ee70f4", 0x8e, 0x4}, {&(0x7f0000000300)="7f24b50efd5e83bc72bd576f18b73656071f2bbe03a166a400fbb5019cff098f104adab603abe4779209942cc49ebcc459cd85b1a0c4dc1dedcf57bfdc0abe6c8a8789", 0x43, 0x8}, {&(0x7f0000000380)="17990afcd5996c8b1e2e181bee75202f9c31986ebe70fa881ded749d32fc1cfc2958a7a131b307b588987573b623be70718f926842cebae34b7578ad56915c55f8e1b43a95fbfb406a127546ed0ee0dcd17557f21b9d7c5afb", 0x59, 0x8}, {&(0x7f0000000400)="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", 0x1000, 0x7}, {&(0x7f0000001400)="cf8ee4e7fe8197272041f1e99e07bb5d97c0314c86ba2579f30cd123ddd130198833237a4f7b4c07bcddafc05918cb0d327f031ecdcc9f311cea36f2f68a2ff379665cc89c0d6e18491c018d15f87394fd367d813505829e08f96bf09753c94ffa9803b7e1fca49877fe43c112145e0697c471edce9cb333c50433a21a3254eab4116515f1fd589feb970c0c58dad2752bd0dde23a584843569b055a86e9e61b0a740ca1ac1962277f3d310087af7066287cbfaaa79faba7afd35c1d22bcc7daac2bc1a4ddacf1e905e53b126e36b3dd250803f23247316388fb401ce33a2e7feb96ff1f6ab5d8c33f1f91", 0xeb, 0xffffffff}], 0x0, &(0x7f00000015c0)={[{@type={'type', 0x3d, "6b65b530"}, 0x2c}, {@umask={'umask', 0x3d}, 0x2c}, {@codepage={'codepage', 0x3d, 'iso8859-6'}, 0x2c}]}) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 282.432655] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 282.475590] hfs: can't find a HFS filesystem on dev loop2 [ 282.672011] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 282.712824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 282.932707] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 282.940515] team0: Port device team_slave_0 added [ 282.981917] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 282.990312] team0: Port device team_slave_1 added [ 283.051426] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 283.058439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 283.068213] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 283.072406] FAULT_INJECTION: forcing a failure. [ 283.072406] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.087133] CPU: 1 PID: 18424 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 283.094500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.103863] Call Trace: [ 283.106470] dump_stack+0x1c9/0x2b4 [ 283.110120] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.110234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 283.115315] ? print_usage_bug+0xc0/0xc0 [ 283.115343] should_fail.cold.4+0xa/0x1a [ 283.115363] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.115379] ? __fdget_pos+0x1bb/0x200 [ 283.125635] FAULT_INJECTION: forcing a failure. [ 283.125635] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.126262] ? graph_lock+0x170/0x170 [ 283.154869] ? trace_hardirqs_on+0x10/0x10 [ 283.159100] ? find_held_lock+0x36/0x1c0 [ 283.163154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.168685] ? _parse_integer+0x13b/0x190 [ 283.172826] ? graph_lock+0x170/0x170 [ 283.176619] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.182147] ? _kstrtoull+0x188/0x250 [ 283.185940] ? _parse_integer+0x190/0x190 [ 283.190085] ? lock_release+0xa30/0xa30 [ 283.194052] ? find_held_lock+0x36/0x1c0 [ 283.198109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.203635] ? should_fail+0x223/0xbed [ 283.207519] __alloc_pages_nodemask+0x36e/0xdb0 [ 283.212185] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 283.217198] ? find_held_lock+0x36/0x1c0 [ 283.221285] ? check_same_owner+0x340/0x340 [ 283.225611] cache_grow_begin+0x91/0x710 [ 283.229670] kmem_cache_alloc+0x689/0x760 [ 283.233810] ? __lock_is_held+0xb5/0x140 [ 283.237868] getname_flags+0xd0/0x5a0 [ 283.241681] user_path_at_empty+0x2d/0x50 [ 283.245825] path_setxattr+0xd6/0x230 [ 283.249619] ? setxattr+0x450/0x450 [ 283.253235] ? __ia32_sys_read+0xb0/0xb0 [ 283.257290] ? syscall_slow_exit_work+0x500/0x500 [ 283.262127] __x64_sys_setxattr+0xc4/0x150 [ 283.266352] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 283.271359] do_syscall_64+0x1b9/0x820 [ 283.275235] ? finish_task_switch+0x1d3/0x870 [ 283.279734] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.284663] ? syscall_return_slowpath+0x31d/0x5e0 [ 283.289588] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 283.294943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.299782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.304960] RIP: 0033:0x455a79 [ 283.308133] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.327879] RSP: 002b:00007f64159ecc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 283.335578] RAX: ffffffffffffffda RBX: 00007f64159ed6d4 RCX: 0000000000455a79 [ 283.342835] RDX: 0000000020000280 RSI: 0000000020000240 RDI: 0000000020000080 [ 283.350092] RBP: 000000000072bff0 R08: 0000000000000000 R09: 0000000000000000 [ 283.357349] R10: 000000000000001c R11: 0000000000000246 R12: 0000000000000014 [ 283.364618] R13: 00000000004bbbe9 R14: 00000000004d3170 R15: 0000000000000001 [ 283.371895] CPU: 0 PID: 18423 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #143 [ 283.379258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.388608] Call Trace: [ 283.391202] dump_stack+0x1c9/0x2b4 [ 283.394834] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.400033] ? graph_lock+0x170/0x170 [ 283.403847] should_fail.cold.4+0xa/0x1a [ 283.407916] ? lock_acquire+0x1e4/0x540 [ 283.411899] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.417014] ? trace_hardirqs_on+0x10/0x10 [ 283.421256] ? find_held_lock+0x36/0x1c0 [ 283.422626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 283.425319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.425337] ? _parse_integer+0x13b/0x190 [ 283.425355] ? graph_lock+0x170/0x170 [ 283.425373] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.451173] ? _kstrtoull+0x188/0x250 [ 283.454980] ? _parse_integer+0x190/0x190 [ 283.459136] ? graph_lock+0x170/0x170 [ 283.461697] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 283.462938] ? lock_release+0xa30/0xa30 [ 283.462958] ? find_held_lock+0x36/0x1c0 [ 283.462979] ? graph_lock+0x170/0x170 [ 283.481601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.487138] ? should_fail+0x223/0xbed [ 283.491035] __alloc_pages_nodemask+0x36e/0xdb0 [ 283.495713] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 283.500743] ? find_held_lock+0x36/0x1c0 [ 283.504828] ? check_same_owner+0x340/0x340 [ 283.509150] ? kasan_check_write+0x14/0x20 [ 283.513388] cache_grow_begin+0x91/0x710 [ 283.517461] kmem_cache_alloc+0x689/0x760 [ 283.521626] getname_flags+0xd0/0x5a0 [ 283.525437] user_path_at_empty+0x2d/0x50 [ 283.529593] path_listxattr+0xbc/0x1a0 [ 283.533488] ? listxattr+0x150/0x150 [ 283.537208] ? syscall_slow_exit_work+0x500/0x500 [ 283.540741] XFS (loop6): no-recovery mounts must be read-only. [ 283.542069] ? ksys_ioctl+0x81/0xd0 [ 283.542092] __x64_sys_listxattr+0x78/0xb0 [ 283.542110] do_syscall_64+0x1b9/0x820 [ 283.542125] ? finish_task_switch+0x1d3/0x870 [ 283.542141] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.542161] ? syscall_return_slowpath+0x31d/0x5e0 [ 283.574214] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 283.579589] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.584448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.589636] RIP: 0033:0x455a79 [ 283.592817] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.612170] RSP: 002b:00007fa5b0214c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 [ 283.619894] RAX: ffffffffffffffda RBX: 00007fa5b02156d4 RCX: 0000000000455a79 [ 283.627169] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 00000000200001c0 [ 283.634441] RBP: 000000000072c098 R08: 0000000000000000 R09: 0000000000000000 [ 283.641714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 283.648987] R13: 00000000004bbbcb R14: 00000000004cfb28 R15: 0000000000000001 [ 283.657793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 283.668175] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 283.674919] XFS (loop6): no-recovery mounts must be read-only. [ 283.679129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.689631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.697511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.705704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.974045] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.980435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.987103] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.993473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.000808] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 284.794224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.873804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 284.956402] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 284.962599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.969993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.977729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.049060] 8021q: adding VLAN 0 to HW filter on device team0 11:49:12 executing program 5 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:12 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 11:49:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xf0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:12 executing program 7 (fault-call:7 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:12 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x400008000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f00000000c0)=r0) 11:49:12 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f00000000c0)="30726f62222fbde19600", 0xa, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000080)=""/50) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:12 executing program 0 (fault-call:10 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:12 executing program 2: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r0 = memfd_create(&(0x7f0000000080)='/dev/zero\x00', 0x3) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000001c0)=0x8) ioctl(r0, 0x4, &(0x7f0000006140)="93397e470ec99e8307dcfd6550534712e0aa8807c784480e26b58b44d32e68c4b42c99665032a63b87c2f278c0572f006fed0ffda1540ad034433c6d9e3a7d57b965e7b15db541f9a902ad34f9d692d772f1e1846d671958272ada50cd44059dcfc8cb6243194f6db4300eb06d11ce74dda931f0caf8372524d56cb79befedccf6eb37a7e1949da07b854098d8201c43bc282ab3e036859961706f82ad4fd649bf29f2bc135c5bc8d2a291428ec23cde751cab8250f3c55547a98ee513da3903d7f003a449ec5a176b8dcf29080c0556f8913435513128aa6b127c866dd1e00ba49d7fb948c4d9a289b419d0bc5645bfbbf21db6f8cee767b49a4ad98a") setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x79}, 0x8) clock_gettime(0x0, &(0x7f00000060c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000000240)=@sco, 0x80, &(0x7f0000000780)=[{&(0x7f00000002c0)=""/3, 0x3}, {&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000480)=""/209, 0xd1}, {&(0x7f0000000580)=""/200, 0xc8}, {&(0x7f0000000680)=""/215, 0xd7}], 0x6, 0x0, 0x0, 0x4000000000000000}, 0x401}, {{&(0x7f0000000800)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880), 0x0, &(0x7f00000008c0)=""/64, 0x40, 0x10000}, 0x328}, {{&(0x7f0000000900)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000980)=""/69, 0x45}, {&(0x7f0000000a00)=""/175, 0xaf}, {&(0x7f0000000ac0)=""/29, 0x1d}, {&(0x7f0000000b00)=""/1, 0x1}, {&(0x7f0000000b40)=""/146, 0x92}, {&(0x7f0000000c00)=""/88, 0x58}, {&(0x7f0000000c80)=""/12, 0xc}, {&(0x7f0000000cc0)=""/78, 0x4e}], 0x8, &(0x7f0000000dc0)=""/4096, 0x1000, 0xdae}, 0x7}, {{&(0x7f0000001dc0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000003040)=[{&(0x7f0000001e40)=""/118, 0x76}, {&(0x7f0000001ec0)=""/61, 0x3d}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/41, 0x29}, {&(0x7f0000002f40)=""/181, 0xb5}, {&(0x7f0000003000)=""/64, 0x40}], 0x6, &(0x7f00000030c0)=""/12, 0xc, 0xffff}, 0x80}, {{0x0, 0x0, &(0x7f0000003380)=[{&(0x7f0000003100)=""/222, 0xde}, {&(0x7f0000003200)=""/106, 0x6a}, {&(0x7f0000003280)=""/194, 0xc2}], 0x3}, 0x6}, {{&(0x7f00000033c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000003880)=[{&(0x7f0000003440)=""/205, 0xcd}, {&(0x7f0000003540)=""/105, 0x69}, {&(0x7f00000035c0)=""/2, 0x2}, {&(0x7f0000003600)=""/172, 0xac}, {&(0x7f00000036c0)=""/24, 0x18}, {&(0x7f0000003700)=""/240, 0xf0}, {&(0x7f0000003800)=""/58, 0x3a}, {&(0x7f0000003840)=""/20, 0x14}], 0x8, 0x0, 0x0, 0x8}, 0x9d}, {{&(0x7f0000003900)=@sco, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000003980)=""/237, 0xed}, {&(0x7f0000003a80)=""/193, 0xc1}, {&(0x7f0000003b80)=""/4096, 0x1000}, {&(0x7f0000004b80)=""/208, 0xd0}, {&(0x7f0000004c80)=""/4096, 0x1000}, {&(0x7f0000005c80)=""/241, 0xf1}, {&(0x7f0000005d80)}], 0x7, &(0x7f0000005e40)=""/181, 0xb5, 0x1}, 0x3}], 0x7, 0x43, &(0x7f0000006100)={r2, r3+30000000}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x7, 0x4, 0x1, 0x0, 0x11}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x140, 0x0) 11:49:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x5) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f0000000000)=0x4) 11:49:12 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x800) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5bd0, 0x400000) 11:49:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = dup2(r0, r0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x3, 0x7433}) 11:49:12 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x8) getsockopt$inet6_int(r0, 0x29, 0xd0, &(0x7f0000000040), &(0x7f0000000000)=0x4) [ 285.759392] device bridge_slave_1 left promiscuous mode [ 285.761158] IPVS: ftp: loaded support on port[0] = 21 [ 285.765094] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.783098] device bridge_slave_0 left promiscuous mode [ 285.788764] bridge0: port 1(bridge_slave_0) entered disabled state 11:49:13 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1_to_bridge\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={@ipv4={[], [0xff, 0xff], @rand_addr=0xffffffffffffff62}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @mcast2={0xff, 0x2, [], 0x1}, 0x5, 0x20, 0x3f7, 0x100, 0x7, 0x2, r0}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'\x00', r0}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xba, 0x20}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x9}, 0x8) [ 285.849435] team0 (unregistering): Port device team_slave_1 removed [ 285.862639] team0 (unregistering): Port device team_slave_0 removed [ 285.875293] bond0 (unregistering): Releasing backup interface bond_slave_1 11:49:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8001, &(0x7f0000000000)="c3b37639c8a8b1602dcc4820a51541f981201675f749d6b5300f2eccdaf9052fe6a7e64b331b8b89b5eb19e4cab3b34be46dc9") getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x20200, 0x0) getpeername$llc(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x10) [ 285.901046] bond0 (unregistering): Releasing backup interface bond_slave_0 11:49:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) syz_init_net_socket$llc(0x1a, 0x3, 0x0) [ 285.959060] bond0 (unregistering): Released all slaves [ 286.347870] FAULT_INJECTION: forcing a failure. [ 286.347870] name failslab, interval 1, probability 0, space 0, times 0 [ 286.359189] CPU: 0 PID: 18706 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 286.366548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.375897] Call Trace: [ 286.378473] FAULT_INJECTION: forcing a failure. [ 286.378473] name failslab, interval 1, probability 0, space 0, times 0 [ 286.389668] dump_stack+0x1c9/0x2b4 [ 286.393296] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.398482] ? lock_acquire+0x1e4/0x540 [ 286.402447] ? __fdget_pos+0x1bb/0x200 [ 286.406335] should_fail.cold.4+0xa/0x1a [ 286.410394] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.415497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.421028] ? _parse_integer+0x13b/0x190 [ 286.425173] ? graph_lock+0x170/0x170 [ 286.428967] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.434501] ? _kstrtoull+0x188/0x250 [ 286.438305] ? find_held_lock+0x36/0x1c0 [ 286.442384] ? check_same_owner+0x340/0x340 [ 286.446703] ? rcu_note_context_switch+0x730/0x730 [ 286.451631] __should_failslab+0x124/0x180 [ 286.455861] should_failslab+0x9/0x14 [ 286.459655] kmem_cache_alloc+0x2af/0x760 [ 286.463800] ? lock_downgrade+0x8f0/0x8f0 [ 286.467947] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.473484] getname_flags+0xd0/0x5a0 [ 286.477278] ? kasan_check_read+0x11/0x20 [ 286.481424] do_renameat2+0x307/0x1120 [ 286.485310] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 286.490234] ? wait_for_completion+0x8d0/0x8d0 [ 286.494812] ? user_path_create+0x40/0x40 [ 286.498952] ? __lock_is_held+0xb5/0x140 [ 286.503024] ? __sb_end_write+0xac/0xe0 [ 286.506999] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.512532] ? fput+0x130/0x1a0 [ 286.515892] ? ksys_write+0x1ae/0x260 [ 286.519692] ? __ia32_sys_read+0xb0/0xb0 [ 286.523752] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.529294] ? ksys_ioctl+0x81/0xd0 [ 286.532917] __x64_sys_rename+0x5e/0x80 [ 286.536888] do_syscall_64+0x1b9/0x820 [ 286.540769] ? finish_task_switch+0x1d3/0x870 [ 286.545258] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.550178] ? syscall_return_slowpath+0x31d/0x5e0 [ 286.555109] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 286.560484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.565332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.570511] RIP: 0033:0x455a79 [ 286.573683] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.593015] RSP: 002b:00007f65167eec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 286.600720] RAX: ffffffffffffffda RBX: 00007f65167ef6d4 RCX: 0000000000455a79 [ 286.607977] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 286.615234] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 286.622493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 286.629752] R13: 00000000004c0aea R14: 00000000004d0f20 R15: 0000000000000000 [ 286.637040] CPU: 1 PID: 18701 Comm: syz-executor7 Not tainted 4.18.0-rc4+ #143 [ 286.644405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.653754] Call Trace: [ 286.656346] dump_stack+0x1c9/0x2b4 [ 286.659974] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.665159] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 286.669571] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 286.673988] should_fail.cold.4+0xa/0x1a [ 286.678052] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.683158] ? __lock_acquire+0x7fc/0x5020 [ 286.687395] ? graph_lock+0x170/0x170 [ 286.691207] ? find_held_lock+0x36/0x1c0 [ 286.695273] ? __lock_is_held+0xb5/0x140 [ 286.699350] ? check_same_owner+0x340/0x340 [ 286.703666] ? usercopy_warn+0x120/0x120 [ 286.707726] ? rcu_note_context_switch+0x730/0x730 [ 286.708725] FAULT_INJECTION: forcing a failure. [ 286.708725] name failslab, interval 1, probability 0, space 0, times 0 [ 286.712649] ? kasan_check_write+0x14/0x20 [ 286.712667] __should_failslab+0x124/0x180 [ 286.712692] should_failslab+0x9/0x14 [ 286.736118] kmem_cache_alloc_node_trace+0x26f/0x770 [ 286.741216] ? strncpy_from_user+0x3be/0x510 [ 286.745625] __kmalloc_node+0x33/0x70 [ 286.749424] kvmalloc_node+0x65/0xf0 [ 286.753131] setxattr+0x1a3/0x450 [ 286.756577] ? vfs_setxattr+0x100/0x100 [ 286.760545] ? lock_acquire+0x1e4/0x540 [ 286.764511] ? mnt_want_write+0x3f/0xc0 [ 286.768484] ? __lock_is_held+0xb5/0x140 [ 286.772542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.778073] ? __mnt_want_write+0x2f9/0x3e0 [ 286.782391] ? may_umount_tree+0x220/0x220 [ 286.786618] ? rcu_read_lock_sched_held+0x108/0x120 [ 286.791628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.797155] ? __sb_start_write+0x17f/0x300 [ 286.801476] path_setxattr+0x1e3/0x230 [ 286.805359] ? setxattr+0x450/0x450 [ 286.808987] __x64_sys_setxattr+0xc4/0x150 [ 286.813217] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 286.818227] do_syscall_64+0x1b9/0x820 [ 286.822110] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.827033] ? syscall_return_slowpath+0x31d/0x5e0 [ 286.831963] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 286.837323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.842171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.847349] RIP: 0033:0x455a79 [ 286.850609] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.869917] RSP: 002b:00007f6415a0dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 286.877617] RAX: ffffffffffffffda RBX: 00007f6415a0e6d4 RCX: 0000000000455a79 [ 286.884875] RDX: 0000000020000280 RSI: 0000000020000240 RDI: 0000000020000080 [ 286.892703] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 286.899963] R10: 000000000000001c R11: 0000000000000246 R12: 0000000000000014 [ 286.907220] R13: 00000000004bbbe9 R14: 00000000004d3170 R15: 0000000000000002 [ 286.914503] CPU: 0 PID: 18711 Comm: syz-executor0 Not tainted 4.18.0-rc4+ #143 [ 286.921866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.931219] Call Trace: [ 286.933809] dump_stack+0x1c9/0x2b4 [ 286.937447] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.942648] ? find_held_lock+0x36/0x1c0 [ 286.946721] should_fail.cold.4+0xa/0x1a [ 286.950792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.955906] ? kasan_check_read+0x11/0x20 [ 286.960053] ? rcu_is_watching+0x8c/0x150 [ 286.964200] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 286.968613] ? find_held_lock+0x36/0x1c0 [ 286.972697] ? check_same_owner+0x340/0x340 [ 286.977030] ? rcu_note_context_switch+0x730/0x730 [ 286.981970] __should_failslab+0x124/0x180 [ 286.986210] should_failslab+0x9/0x14 [ 286.990011] kmem_cache_alloc+0x2af/0x760 [ 286.994162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.999532] ? kasan_check_read+0x11/0x20 [ 287.003690] __fuse_request_alloc+0x27/0xf0 [ 287.008018] __fuse_get_req+0x1f8/0xa20 [ 287.012003] ? trace_hardirqs_off+0xd/0x10 [ 287.016245] ? fuse_put_request+0x360/0x360 [ 287.020580] ? kasan_check_read+0x11/0x20 [ 287.024728] ? rcu_is_watching+0x8c/0x150 [ 287.028876] ? rcu_pm_notify+0xc0/0xc0 [ 287.032771] fuse_simple_request+0x28/0x730 [ 287.037101] fuse_listxattr+0x4f2/0x820 [ 287.041079] ? fuse_xattr_get+0x40/0x40 [ 287.045059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 287.049824] ? retint_kernel+0x10/0x10 [ 287.053728] ? security_inode_listxattr+0x4f/0x120 [ 287.058666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.064207] ? fuse_xattr_get+0x40/0x40 [ 287.068188] vfs_listxattr+0x114/0x1a0 [ 287.072082] listxattr+0x135/0x150 [ 287.075628] path_listxattr+0xf5/0x1a0 [ 287.079518] ? listxattr+0x150/0x150 [ 287.083232] ? syscall_slow_exit_work+0x500/0x500 [ 287.088078] ? ksys_ioctl+0x81/0xd0 [ 287.091710] __x64_sys_listxattr+0x78/0xb0 [ 287.095946] do_syscall_64+0x1b9/0x820 [ 287.099838] ? finish_task_switch+0x1d3/0x870 [ 287.104338] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.109274] ? syscall_return_slowpath+0x31d/0x5e0 [ 287.114213] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 287.119590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.124442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.129626] RIP: 0033:0x455a79 [ 287.132806] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.152176] RSP: 002b:00007fa5b0214c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 [ 287.159888] RAX: ffffffffffffffda RBX: 00007fa5b02156d4 RCX: 0000000000455a79 [ 287.167161] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 00000000200001c0 [ 287.174432] RBP: 000000000072c098 R08: 0000000000000000 R09: 0000000000000000 [ 287.181710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 287.189021] R13: 00000000004bbbcb R14: 00000000004cfb28 R15: 0000000000000002 11:49:14 executing program 5 (fault-call:4 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x41) getsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:49:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xebffffff) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:14 executing program 7 (fault-call:7 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:14 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) setfsuid(r1) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:14 executing program 0 (fault-call:10 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:14 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@int=0x1, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x8080f, 0x80000001) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x10000, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x1}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f0000000300)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000340)="33ba081eb76404a5cb863eb6b9768f29d1b2f5ab7bac49bfccddff929e9a713f3cc8f032eb7adf92c6e74bbef81b85adef3578a3", 0x34, 0x1}, {&(0x7f0000000380)="ccd545a6ca25142ca74e51f56179ec88bdb69b8aaf15ef97f49e1a4f1acafb0a1597429d5038a76d979f7c91de51255016a7b9b6c9eb4861925255e100acafc0059dae18843c71ba7280640a7f046a5171", 0x51, 0x73a69ad9}, {&(0x7f0000000400)="91dc73b6d8fc000990a297568499622872ccf0cd3f5bfa6ced81e7f6f33d140d4755c3ea8f62a3590ae0eebd2222f0ee23d8558d6f6d041e847a36d6154290f9b98ef4613a97c346d5c8d8cd0a1b1187737966df7638cf93a7abe186292456c6904358987991e232a5f5f0fc052936155822d7c3016a46c6fc3b7261ff02", 0x7e, 0x4}], 0x0, &(0x7f0000000500)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x2}, 0x2c}, {@dots='dots', 0x2c}, {@nodots='nodots', 0x2c}, {@dots='dots', 0x2c}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x7, 0x4) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x3ff, 0x3, [0x8, 0x401, 0x23e0]}, &(0x7f0000000180)=0xe) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r3, 0x800}, &(0x7f0000000200)=0x2) [ 287.556237] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.562807] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.573867] FAT-fs (loop2): invalid media value (0xcc) [ 287.579450] FAT-fs (loop2): Can't find a valid FAT filesystem [ 287.587564] device bridge_slave_0 entered promiscuous mode 11:49:14 executing program 2: r0 = socket$inet6(0xa, 0x2000000000000002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 287.674140] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.680655] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.690350] device bridge_slave_1 entered promiscuous mode [ 287.761453] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 287.801159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 287.936857] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 287.982605] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 288.068312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 288.075276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.160525] FAULT_INJECTION: forcing a failure. [ 288.160525] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 288.172381] CPU: 1 PID: 18803 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 288.179748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.189246] Call Trace: [ 288.191831] dump_stack+0x1c9/0x2b4 [ 288.195448] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.200628] should_fail.cold.4+0xa/0x1a [ 288.204680] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.209776] ? trace_hardirqs_on+0x10/0x10 [ 288.213998] ? trace_hardirqs_on+0x10/0x10 [ 288.218228] ? print_usage_bug+0xc0/0xc0 [ 288.222275] ? graph_lock+0x170/0x170 [ 288.226061] ? do_raw_spin_lock+0xc1/0x200 [ 288.230298] ? graph_lock+0x170/0x170 [ 288.234086] ? lock_acquire+0x1e4/0x540 [ 288.238052] ? __fdget_pos+0x1bb/0x200 [ 288.241925] ? graph_lock+0x170/0x170 [ 288.245714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.251236] ? should_fail+0x223/0xbed [ 288.255114] __alloc_pages_nodemask+0x36e/0xdb0 [ 288.259768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.265292] ? _parse_integer+0x13b/0x190 [ 288.269426] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 288.274429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.279953] ? _kstrtoull+0x188/0x250 [ 288.283748] ? find_held_lock+0x36/0x1c0 [ 288.287805] ? check_same_owner+0x340/0x340 [ 288.292126] cache_grow_begin+0x91/0x710 [ 288.296188] kmem_cache_alloc+0x689/0x760 [ 288.300346] getname_flags+0xd0/0x5a0 [ 288.304141] ? kasan_check_read+0x11/0x20 [ 288.308274] do_renameat2+0x307/0x1120 [ 288.312154] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 288.317068] ? wait_for_completion+0x8d0/0x8d0 [ 288.321639] ? user_path_create+0x40/0x40 [ 288.325774] ? __lock_is_held+0xb5/0x140 [ 288.329830] ? __sb_end_write+0xac/0xe0 [ 288.333795] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.339323] ? fput+0x130/0x1a0 [ 288.342599] ? ksys_write+0x1ae/0x260 [ 288.346384] ? __ia32_sys_read+0xb0/0xb0 [ 288.350429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 288.355954] ? ksys_ioctl+0x81/0xd0 [ 288.359568] __x64_sys_rename+0x5e/0x80 [ 288.363532] do_syscall_64+0x1b9/0x820 [ 288.367406] ? finish_task_switch+0x1d3/0x870 [ 288.371889] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.376805] ? syscall_return_slowpath+0x31d/0x5e0 [ 288.381738] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 288.387092] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.391929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.397105] RIP: 0033:0x455a79 [ 288.400274] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.419558] RSP: 002b:00007f65167eec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 288.427252] RAX: ffffffffffffffda RBX: 00007f65167ef6d4 RCX: 0000000000455a79 [ 288.434516] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 288.441767] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 288.449022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 288.456283] R13: 00000000004c0aea R14: 00000000004d0f20 R15: 0000000000000001 [ 288.494938] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 288.522979] team0: Port device team_slave_0 added [ 288.605982] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 288.613565] team0: Port device team_slave_1 added [ 288.673935] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.719115] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.770010] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 288.777296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.785341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.806591] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 288.813677] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.821652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.113185] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.119568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.126215] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.132575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.139818] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 289.927662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.005674] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 290.080155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.089511] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.095653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.103262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.178569] 8021q: adding VLAN 0 to HW filter on device team0 11:49:17 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup2(r0, r0) accept4$vsock_stream(r1, &(0x7f0000000300)={0x28, 0x0, 0xffffffff, @my=0x1}, 0xfffffcec, 0x80800) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101040, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0xe46a, @local={0xfe, 0x80, [], 0xaa}, 0x4}], 0x1c) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="98ad25b873f82303f2d2be53a08e6c8d7c3e931de794cd67b2eeb47588bb66a6bd6622df8163d4b2aff2dc550c4d85f9fd83eb12f829a72bc17e2f981d1e4292bf8e3064e024c289a2610765bb9ed5404919b0604d609c4abe124556f9a4cb58105b9e137b6fac32a8d2686cba0b4b057dc01b3751053c410bc771e6fe070003592dbc1d6404f886de18214cf79439d641b366c15f6f227a1a74909af2ed55b475e9512d521f77f2ee697bca692f7ecb4e45b9f7c49cbd4895a34951609b2b5292c015edf500f1d97628eb3a93926a79600fdbff0c573571b977ca87aff6407f375706164e76b5102557b02aac09", 0xee, 0xfffffffffffffff8) keyctl$clear(0x7, r3) 11:49:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:17 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x30200, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000080)={@ipv4={[], [], @rand_addr}}, &(0x7f00000000c0)=0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r1, &(0x7f0000001000), 0xc84) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:17 executing program 5 (fault-call:4 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x14, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:17 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x2a1b, 0x20000) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x81) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000300)=""/178, &(0x7f0000000180)=0xb2) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1000080000002) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0), 0x4) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) 11:49:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x82) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="25b14159c0cde955c6b0295e0ac24331", 0x10) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x80007, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) wait4(r1, 0x0, 0x8, 0x0) getsockopt$inet6_int(r0, 0x29, 0xd6, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40003, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000100)) socket$inet6(0xa, 0x2, 0x400) 11:49:18 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0x8, 0xad6e, 0xe05}) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100007fffffff) getsockopt$sock_int(r1, 0x1, 0x3b, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0xfffffffffffeffff}, 0x8) 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x7c, &(0x7f0000000140)=[@in={0x2, 0x4e20, @broadcast=0xffffffff}, @in6={0xa, 0x4e24, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, @in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24, @multicast1=0xe0000001}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in={0x2, 0x4e22}, @in={0x2, 0x4e22, @rand_addr}]}, &(0x7f0000000200)=0x10) [ 290.966350] device bridge_slave_1 left promiscuous mode [ 290.972071] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.989096] device bridge_slave_0 left promiscuous mode [ 290.994742] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.998635] IPVS: ftp: loaded support on port[0] = 21 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x93, "81d67bd5230aba554c56771f6dabf2f9dca04e7ecc8fb0cc9a7b7f971e2f3344207da5b72cd4ceca445e5d4f177dba66343ce45f9dbb4c9b34637565b955262e61c14b05d2491940dcd3eced70410c66318aef807eba0df10865fdd6d037d6bbf07e926da4ee20cc281d12cd203653acdf7599e83d3fada21fd446c4b60e0eb36e18c42214c73e4739bbd3757852e5b1da54ba"}, &(0x7f0000000000)=0xb7) 11:49:18 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000100)={0x87, @loopback=0x7f000001, 0x4e23, 0x0, 'lblcr\x00', 0x0, 0x80000000, 0xe}, 0x2c) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0x2, &(0x7f0000000140)=""/52, &(0x7f0000000180)=0x34) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) set_mempolicy(0xc003, &(0x7f0000000000)=0x409, 0x0) [ 291.050658] team0 (unregistering): Port device team_slave_1 removed [ 291.068790] team0 (unregistering): Port device team_slave_0 removed [ 291.090443] bond0 (unregistering): Releasing backup interface bond_slave_1 11:49:18 executing program 2: r0 = socket$inet6(0xa, 0x7, 0x2000000000002) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000020c0)={0x0, 'gretap0\x00', 0x4}, 0x18) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = semget(0x3, 0x2, 0x20) semctl$GETNCNT(r2, 0x2, 0xe, &(0x7f0000002100)=""/218) sendmmsg$alg(r0, &(0x7f0000007140)=[{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000100)="a62e2bffcf134c24f4fa1456d2449938fca7fa04c2bbcb4708655cecea81f8397c6937c86f270b732329f6f0af837a7284edaf39750aca3d3a822a0531bfa34e9649806012f7e9d32ae0a405b13c5cc3a1f17ce784dc4a0ef6019b11fdfbfc6d32d8533b8e44e67c527c1d9063679dbe80bfb4a66ce694d8f170b55617081d10bf75857feffe54cc044c931e0bd2bfaf7e7e6888ca51720a914193d62b5434d7381590", 0xa3}, {&(0x7f00000001c0)="7e859fd87eb959ab026096c39704425f93b24d5faf07b18f593516bcc7f12db17e064a2bce0670a0672a97781ba9f67928e278f89916fc4ee405908aae1f45404cb234fbbc05fb84c1326030b41d38c8baf835555e4bd2f63980b437d015f5ed3d68c48ccd0c83d13fdc741e124cd866ef7eddf5c5617e3235032b14d05ba8d7fd40c8a339d5adf3307a31f2231b8400ad6e71fdd7f12fbf72ff6d2e6edc2d76d933125cbc4d560cc5407ac96b6c8a1a67443f4a4a4d50f8aa19fd121fbd0c985076c68d8e1fcb4541", 0xc9}, {&(0x7f00000002c0)="12e9042709588845d9a2939b4ac99cdaa3df5c70f2071af74e572a0b7c466ade5bc447ce992fda28b9f1bdd52a7203499efffd2396bb59d7086812caade645b369a6b97e7295a7a2b2a69eefac58e2d530acd444f002b28794236516bf42c84edadedcb86cf8b8c11ea147595552427e51417aec0109cd65cd", 0x79}, {&(0x7f0000000340)="a67411df0e4fdbed086c5a877498267db289e3a4f1e06346d160e806537c59d782ae5b198ad7cb07b351c091d1f38668cc00815805951547d4b44bd938b5808e8d85cbdf58613af66ff1d68b598515573affec4ee99297046063a26516e6648ac6bfc4a634d8b5de79a1f4bd93b2805467f9ca69e6a8f56b3c9e668b38395fa1209491e315a50d2480c764977f2cea7a0a4c3d7b97e24ab2734f15cbab6fd092431ec43c20c85318d17abd44557a785c", 0xb0}, {&(0x7f0000000400)="20940028dc2459c6820305095df76e128736a43a1be78100e0ca50d8a47a0fc6a953778bbde148c35911f91ecf36015749176294e552412b85dba4f749797d1edd5287c35f5ecbb7c1c5bc0eb2bf522b1402c1fdbac9453d73145ea760f9dbfba9e81723df2db687f1f960f2527f29b5e97a6888e5a5a66513366502840b66dce371d552c9f9b831580bbc9ffaf609342b19d0213e0bc1fd97c4d2d2cb7cdc728a5c6a06817f37bba30b87158a10dbfc324d7e9db0cfcd1b5bd7ba75323780ff3f79de05eeaaccb709b8", 0xca}, {&(0x7f0000000500)="bf0425a7d53f87f9f5ced22b1d4481fe9bddd35598bcf7e600b5fb7e082c3bb801986e3ac76f6ebafdcfb321bd87c982610052b51d326a8ea4808eabadcfa111c8cf69200a9a5e6c94663fc10bc24d5056aeef182b8549c4f82780d277a758def8", 0x61}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="bae1784a2ded7fdbda3c89a60ef7fda728286809320ea8ebaaf95abc9a0190ac36684382c830024733854c1d4f6823260f5acc468f3dfa6f9ca6eaf90e18e5e03e9b6f775f64f2d1b8d757020d6675f1fae6d41ae3cd5693bbc8c4cbdffae115e6fa27e78ef0272fee57f51a32d430c11410aecda594ecd561d78098438e9b19c9b33e6a754ce36ca1d7603b376890760c6f7e79e1f7de469d0c96ff4837b3aedf921b32515105331631e97e89ab1cbdb05c44edf554c9897365cad473203e2c", 0xc0}, {&(0x7f0000001640)="28cdb5b5b2703bc1fe6277d17b1125f093cdbb1aa0722ff796f8687b6e7b48a73ad99edd6cd7b058a313f10ffcfd201610a6e8727ec2653a59a7c33c25acd56ae6344fe44c91608000", 0x49}], 0x9, &(0x7f0000001780)=[@iv={0xc8, 0x117, 0x2, 0xb1, "6a51b7456d0e7bd767fef064c0f4d060c6cb03e467f1f08ce1daf56f2807d2f8fce3f057ac11e10577e76670a27efa64612f16398cecbbe778aad5077d3e0228e124c8b1177e45206190ce566d090be7f20fa820b05d61633c9273665033414fcf509d1d89d1651ad2a78438dbb6a1901cc5a8aacd296e26b001a169d6d3f10dd6a057af22e41b1f538f7a717a82f7f0193a0cedac69322c0763182e16139e35c07e9cbfb6cf5f7777dfd758ebc9c3a587"}, @assoc={0x18, 0x117, 0x4, 0xb7}], 0xe0, 0x10}, {0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001880)="12be9499f30229bfdf69ccd36992538cb15f051e21f1fd41edda668577ddd916128b4db6a68d474bc933850265bc57d610358c4bf4ea40ef4b1b15546b91b1b7fb6b8d2cb483d779b4ba2fd2a18befd5584738135786287ef2941e0cb1", 0x5d}, {&(0x7f0000001900)="bee6b42ee1010928b66238a4b23c11155d6bb936358c89a05a02ea73551be4f2c7fcfb90d0fb2b4690ee91271649e5f88afebd09596ff59f975a205dea37dd4e6ab034105a18db2f58490c5c964f0d67e1e078b813d2664e8c1998a01fc5d4a1fedcb1eae80c37e8c7990bcd9bfab082bbb32fa94617b61315b5d4f7aa9288d8ef73f1d6ee54efbb02fdeef5cb2ff729f8288430e8662bafddfe4ecf6cf9092c1c8bd8b5358c82686434a49cde4dffbc9076dc72d303684f0d2b80412d0fa1fae302becf839703e8", 0xc8}, {}, {&(0x7f0000001a00)="fd85c0148cc4f11e69e8f8df4c7edf656f81ef677394c092d039e93f0a78bf80e029deb1f0e4a4b4b6f9693889e9f07b2d34185d6ae67e38cce013a1c8f1228cb4051af2373a2e5c69bb9fe6958d139047c62d20125b8cd046db75fb1e1c6725ccfcdf201773d16677044a0f92224f11286e7985363c690fc19edd041a6ec21e4e4ef7d11eca77ff133e7fcc1fe52be7520577143ad9dd5ba86a7e7730919180078f67529b623ee101229924a4ae11b5a2a278ee85e4955471f82e3459361665c6010091e3d765007f0e044d1d6539816832802b6b47f7d5cd05effd14f8d1f654a5d4bfceaca7", 0xe7}, {&(0x7f0000001b00)="df59abd78be4a53e4823d3ae9e4d7cc982264c6a2c7f10bb9e8923f2d41cf9db71436d1b088fef002b9bd4b3c28570ba289fc83fc4f6bf3cc86db82b191b7f6ea4b24883ced7743d0e1e3cc4ae793ea8b8232918f3b6c3e5bf88a40fca", 0x5d}, {&(0x7f0000001b80)="59bdde548ea358a70491de3004c288e402f602ebb0c91315f6031d043047e7d7c4311b64473a32bb905dae971c8301fd1bfbdcc4c44c5122b2b45e4ede7d757d6747c75bf6af8cced0c516b6b8d3f958011c67352f5789de23641bd580f41012e7320ad9791b05e69ceb812f4f97f30edc2c682a1335d627fe889a03ed42eeeec36797c58f7993009ca34f6a4217e7bf195a3e5d972ac2d0d0769961", 0x9c}, {&(0x7f0000001c40)="ff0ba734547c16ad98f0bc2847d39c809790aa95c82144e2587f9feecadf87dd4793937f963c023f242aa243767997e4ab0a4dcb2c466a0afd5b1ef85593fc38f26dd6e5d87dc78e9463b945f5894304cf510bf00d177c276bb5c13dcbafb2a0204c42100830559834e3d387ba6ca7ce9a6f345ca6bbdc198a552cc5a66af5f6e0f1cdfbd54f698f2e8397e56b9198f1dab710ae7125dd07bb13e56f0f9e7cc137b7f7843466aeb4c87e56cb11c8345cb5415e7ae9904d183c41d3eab74df0e72f6213a103fcc342e8d1a451842d300cc456ed5c2d29f6e040d1e27c0c99a321fe6b13", 0xe3}, {&(0x7f0000000080)="fb4c6247fe96780ed03f5752b08da06bb2345197e24f93756e35b917fbfd98265d43c21115d5478bd43be93ea77526ab840da72e9f7f247be336da61", 0x3c}, {&(0x7f0000001d40)="43b96cd05698fb2118dd4fc31c31b88bc2b4f07319a4ea2ca2d55a50fce52a1952184aaca38b668d9f23c0dbf40dc073c6e2ed759884e8088e05c436eba12d31649ce5a260cca9fde410794dff1ceacf695d735dd4a8f0825caaad40c4c776e178cac1c36b088b81c8995a2d7a669b1a6cc315145f4f6a4b049d97abb370485cc2f6f4f4b47bf82103abd44cf5ffe0701aae4c596478ad3ede70219320f80fff3dcf7733a5c040d2b11bbb1078cb3258168d", 0xb2}, {&(0x7f0000001e00)="d758ded4c255b57518e4898809c17564289cd02f9113281ca41f1966f0eb00479d84f9b3f4c6ec4eb5d5baf854fc6262c11f68a7664a2e422f12191865ce56b5cca03579f11d0bc84bfc25d980ff259f138ecb8a0153cb7b29e93ec51b6ecca2a67d9783bc1bcb92b20af52023884369071a408e7c0d177137bcfe8457afaf746f745bdc270030a3daffb4f4c742f99b0e8841115061a144cd7b4cc2f985e1c8fbe06c97c7c498579493b06a66a560b281ff4a34f8d64291ebce14410ebe34cbc1c62783d6", 0xc5}], 0xa, &(0x7f0000001fc0)=[@assoc={0x18, 0x117, 0x4, 0x6}, @iv={0xa0, 0x117, 0x2, 0x8b, "a3a8c208b0418de19b7a047c396ad9731c5f6a3c35ecb25d746d4241f0794a03e48d484b35f94b18ef2d902c6ca5f8ab91befaec05791c10b1f06a992e2e65f643f35aefc33f53eea64fd0f538fa2f9f7c1f3b81403f2f90e9545c169e9a5699b5101cdbc5c4bdfb4903f73434e1e5497a9e03f3525eb43a15729126bb1b6192999d9e4486fe1f4d188da2"}], 0xb8, 0x10}, {0x0, 0x0, &(0x7f0000003180)=[{&(0x7f0000007340)="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", 0x1000}, {&(0x7f0000003080)="6b9823532bd8f466316cf80213c83a1edaa9cc36018e3bf00ecdbb8838b9c532d6476f52a58b3f823a25d8d37589a5b943b46d15870aea13e1bd0528f350360c809ecbe9377c1341", 0x48}, {&(0x7f0000003100)="96d5cfe9b9552720f0cc8431dd83aba01c948b213f99a6d7e667722e2e2eaf277ea800c96c9db50241", 0x29}, {&(0x7f0000003140)="4f5cd9ef0b79761686f5a3a275f5c1b3", 0x10}], 0x4, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], 0x2c0, 0x90}, {0x0, 0x0, &(0x7f0000003600)=[{&(0x7f0000003480)="2cb9fe97edcf379bb594b938739e9bfcb2f274d9ffbe3c36571939bc59101a12c2bcae57430ad924e4789ce6803705249da2d62a434cda2dda4526b4e844b90a6ac2564f68d8f4fc23b3062463aa7bd61e605f335e8b2467c7f3d3e4f6d7cc1abc28d7f190a044375ddf2e3f904b29", 0x6f}, {&(0x7f0000003500)="f53ae6835c67e1672ce2024522368dffe5c5b02ea8e00c83ab509675e758b8b9d9b2effd08fca73c27decb54a07d0f036a61ef2713a456d1f525f236520dd6e52d35987ec55a955f1b61fef337a62988ed41ac1ebd6769ba041855532f51f368d1bdf9cd925dfedc96b91b9bf0bb77ef14aaba8d73345faf4efc89aeb1750b9bb00238df9451600d3d5ef1fffe4d6a37d61c1f2da10a7c628048223921a6f6b4bf293f8e7ec31615f4c1912cb05fca568aae2233b19da20c925cb5ff85fa5706aa3200bf6ecb3770b462dcda3a0e52f8e95e5fd5a7c23b26466c2553af6fa8", 0xdf}], 0x2, &(0x7f0000003640)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x200008c0}, {0x0, 0x0, &(0x7f0000003840)=[{&(0x7f00000036c0)="6cce1914b832c0ade8628f0f4d2d1d15cea825893a7ae5fbe3335f175adbae1b146724a0ff3ee232c3c312b29ab4780ad37e614331b9fee112f71e912cb9341218a5d9b7dbf05b3efe1ff4bc417d5a004773b7ed4796da9959066fc6b76e4dc132f55e243d8766eff17ce57da172e43359f4389a3d42b1419c5a9f0cde34f1243fff7946cf262617144ae56fe96e584db386f60e295bd887b37eb2e7d071196511c69908f8bdeb8970bf0bd0c0c06773abca4ee0424b701f9b619cfce7f17d1f34ce12baa937e1e7f8dbca2d", 0xcc}, {&(0x7f00000037c0)}, {&(0x7f0000003800)="862b7b833321de58a138", 0xa}], 0x3, &(0x7f0000003880)=[@assoc={0x18, 0x117, 0x4, 0xf35e}], 0x18}, {0x0, 0x0, &(0x7f0000004b40)=[{&(0x7f00000038c0)="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", 0x1000}, {&(0x7f00000048c0)="d9e910bc53bdadd52fb60bec3d54bdeaad4061cc9a9780979d5d9fec806c4f26ae11f25579d134a736bd43bba34e0ced2ff36632174afbf87ccccb3947e321e5dc9a9ffc530cc1703db042654c1540cf550b92ef2685210c3db6583ca55c43930bb9f16d878e5e3ef4", 0x69}, {&(0x7f0000004940)="57a765bb61276d79f743382880b1a65399101c10abad0206b0544cb6b554e8c2a2c7a0d1060e6910aeaf1588a6f6390db77e986360d7eb91af98dea63f6434a5a41f5a6a0ecf6a472bd6ed6aaceb69b8cab7f2150032146a4f378ab31d740b0bea12c378c5d968e36982a450a5819d3756f36047e351dc39a785bcd55b468f469378e59f9d735497ae059a", 0x8b}, {&(0x7f0000008340)="4e1f0545184644a8f1b80a75032acfc01a06f8bc54a1a63367523121e5cb941cc53bdc7010c7c087253325b8b4c565942987ab068e93a7e375ce697eb1a57fe3a868947713c66154", 0x48}, {&(0x7f0000004a80)="3840ce4885b2f265c20e2d21c1e09acc83c83e724570c8c8", 0x18}, {&(0x7f0000004ac0)="b49a5f7cf873d4518eac5c2c4d35c49fcd16ec60d4b8b6b34f58155ad15b14b27feeb3ace02aba45734d65fff6bd8c9aa37e71d9e65f9a439964a1e78e1a9e50c02ac67ee765d0d4ef3f7273f8cf", 0x4e}], 0x6, &(0x7f0000004bc0)=ANY=[@ANYBLOB="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"], 0x1030}, {0x0, 0x0, &(0x7f0000006c40)=[{&(0x7f0000005c00)="bc98d031b6e7041972608a31ec9a2d3498471a40faaa56e42f84f0cb98c5dd3ce2e2d3ef5e3ddc28d04c74ab5c87f066134a2eeaf297c8c10633a6ed871f4ece7bc40c32431d04a1e241a9662c1c7b3d3db36096fbff06a077b03ca6e2fef43f44dd061dd1ff8a77bfd1487563f691ea5d096fb91f0f0df47af8af30873b3668553bb3add82b08598cf2f18e776914424ba0508bf9f75d8b156d95d15ed784a5d5a7ff09ff3714290d53ca0657dd1b5eb7f03fbf0efc0e3265befdfe1b59a455d87877831ab0242c69ce6087ff2748828e55fab8e925b83f1dd769cfebcf6fb25fe19943165e68721d048ddc00b45fb29a530eacb295db288db6160a006580d67fe8cbdee76b71b4cb52303e2efc2b8e3eb67ec57ae0254c027689ebc60293a9a444a38d6e2de10dfe54721a30ce2eec76d0346b900056c7a5e0a84cb8cbbbdcc069434a0d2188fa54cc36b6b48705c6a4992cea38bc21a7cf369f6b2c391a539802835af90afd2c04bf74b9e3bad457e5d77d57b2c32c9276f23d878f0f39c7ea77eb3c9b67a820c6bea902af10f9de59e9e64ea02c634aea9bdee82bdc28e71b55bccb55b3da8a271074816cbfc7649708649b42a2b1247a6d4d016e231271645fb99795268a7fd6a9f61de4071b8f12bce9a9767b63c90cc6d5e80237011fc52244b87af641cd0ec8b43c149ee6e37d45fc69a1e03ebc059327dfb67a6954dd18fccdd498efabf27a6bfd9939bd792bc2aef7f2d250bccc69cebfece9e159dadbe6f09ef029cee8811c9d690c5c2346bb42bd554da34e5da7c4132e8cdeb4fc646456ce7173001335b7583264143784edd0191e69ba07614597afb5a3b5c15f74cae2d13cd694085a688c06596eb39ab2427d0550ee2db1f58a0c7fc1f7b63ab9c7dc948febfcdfea9d9a0e80764c111961ddd36329af536cac3021fddf74a2661c2a6ca5ce468c93010b05a619659b7cecb8cb5b53513b63b6578060ff0c429d25369acd1a71f6c2e2b0f7ff0d6f7bd318d8a7a21b047785da7d581b7071cac56ac2d57ed4f0bbfd544c5217794cc016ae3eafd782573aa39a12149843bc8b7d4ffca1b50a4b10d0997ebdd2d920441dd70ac9e2ca556af07887573e8e96f1a346c9a717ffba8a2cf1cde7356c70aed594d015563046a65251076cd9bfbb04e0fe581cbec0c152eb83c5c78d3f79070a1016ecaa9900b6293fb7bdb33b931f50ccb885901d855a9284c6abe131f378de3945c2f789d80a91462e8e9a0313f83e3fb1abe65ded812410bbdbadae6d876e2558dcea5691dd88365665c95c37b655636ffe5c5e7d7b892361b827c4830ece5154e78e4c9e7c2bff2e4420fab2681ed7e5c3c8885811b01d9a1155b8e4e4c0f5d8fac7609063334a72c031c6f7e7660fb34050c2e1c32187898d51f9c95bb1140bef38c8be8b9ae67f297aff95a27de103f18a62aa67af2506d2dbfddac4ef18929f52d985b95dd107a1cf443d7ffdb46c315362a1fe600e5d8e73cda053db4cbc440ae00b806015f305e8543293f38d0fc657233e0e5a8e66a553bc3c0101499f385a7bc6547aca3a3f30e11c9104d7e5afdc558c7b2227d8f07a2d6656ce47bf8bd54ceaef285171b08d3a0cce5fced836ecc6715a262fb03beabd49ce3afc95ff4f34bb9546373e47ba62aad1ecc5f3c950ea69c694e069ba7a00e124876f82d8b863c0c31338d9046de924f7d9b12391bd2254f9e5b70687b3d39564aa9cdc35b1f53a4d9cbc9c5c090bf29eab9c8967e6c33f7b01ce58f2377ed8104943e31769ff164e7051a9876cc69c3077dc81b0bd7f54528da5eb2643df9a128e35ac5f45db9e0e1e06a566d1e83f78ea25b35fb9c3d0479b0dc906af3fbf1098d65c0f4c58d927d8dd6679ffe59766bd9d223a18fa9c08d4ad670a7f35144841313de649ae5ee1a86da2fee91047ba50feeb5443a58b96eef8870d18512639690ea0c87a31c07cf4a97e177e111e099c97eed68a8fd716e0f638a61dfde9e1632fe42e66326cc4ac2e9c8afaa6c22acd921853bf1087a6190cffcc86346ab5e202b29d6250a193064b9d1df50d2031f13ff413f63ebd5247dae3ba36606102311e731a1a962ce6401346a08bc6cbd3a45c47c3939f775e5e57984a0a769361c3037974be77a0c7b25734224f6e342d74b8423f76e67a9f71d109d04cf0d46b81cbc30ffd5cfc8051bbea0b20f547b9e974f875e89dec4e2bb918fa1fb6cc006dc21f7bbf4a2704920ecefacda72626204b16acd22e1bfaae626bb872c940497bc88c5a02d78536ee53d6e10a14d7912a4423c749f3160e07af3f7efcc4d437d3e29d3d2ec85fe967f69a575156d124eed540f42a1b30208b5238f2e41f64fa5658dcf9b6960f382bd3fc21fb4f90dd6f72f63c52a441c75212d4ef4637a7c3746ccb72cf85650271534b30ada2c66e8cc7b28ef3efccc4badf3b184a5c64ee78b0cbc95fe02de6a3b88a70f5422fc0d1095460e08cf05315f04f315dd49506cf395b97f84e34be959c9e52acb5487f27b6cdc95f283d35a71c12ae223092bb9df791fba336a98ed84ad577b971e7ad1ca45d81325155e13758439edfb659f255c5aaaa6b22eb880ac81621061154789df72a053effc628d2ea000578a6b8706a046380abe87c8b4c58ead87f0ff9b725fc794ada572a12dcda7a19c1a42666c7d6a468a3e7013514ac1610663c3dbe5c87425701ff10faf731fd4a97116669fb4be58c4d034209fdf1cb37d77c8521977892f5f3529ee4e593de7b561098d10fad593febb186ea34f511beff8ef1f8c25fc10f185b1b53fbf8616481d4dc2f7d2d902cbfb36cc16e39f6ba29696600866787565936f70ddcdc5fa86edf2492efb638bb924d509c81b17a49d71fff6298e88d1aa77ff54dca95692587166a2b82d953301a00bb4380453908bc436184fb910a87396188f168bb050bd71a7419cc90bf77175f3895f57ef8ce64ab8afe4f9d883d49e38049e0a31321989a73177c166be97cdfc67880060d5073add32d28ad44d9672688ed5d562837c8537a7b83e90c76a7d6d77ccec6e69b0e095e10dbc04c8c0690352def2da735c6333cab817c0202a12903a308c52ccaf1be3886b412f7b7ba68fef16c69aa3d0118c501ea24d395cd79898d38bc75e9902ea2c2163274a23202bf8d9974740d82d4c5c5db5f9df0d8774583499550b2ba52f8cb05bd22ba48efd3f713a72bdad98e63bc5963603dec696e22e1d9fe5af8febc9404e5f38b5fd314a3ae56a1c1817fe373ce635a5da00c8266a116c517c84d84f7f33467471fe7c57522bc5d83652032da34c75b696867472caaf32cfa4e06db462321f0a00308b24e8644af56a3fab15937aa34808c7ea116e67ff6bfd6e0199ace49e0cb11ba156e9593b52f8006697024b9a8e71010b5603832cde2a8af019620e06b3fc8fdb70fd41164c55168fcb3d6866bb7aff11940f6054eae461babd9a2ac8141016751d68e09caa570aa2ea28b1892a39f36f44b4a5641294dfad0ebfe636fadecf78c6568b2d6368db7956998bb9b18893437d43aaf84db49bf93224c1db79fefe8723cb546dfe7c421bbf416ea496fbe8bf9d1e8dedf03565fb0fb35ec5854908b4d54b6c054556b90d0cb415e25de3de6bd4998bf14a14f7377a5d2907273b8bc607d5f027b46eba47d0225836027fa8ba834af187687eccb20b941bb1db4a05f742409099b9bd97299cbfc5bdc82ed53a53400018e8676a25c4942c5c5db0082cb6cab4fa47dd6410c9c732279fbcccdfd95b3ce9b7173e28a65022e41e24898021e1c3d3ea5fd1dc9ce26df58829e0093ad8dccdfc971db664b505fc3b59a2f3af9e30a26e648ba3228f00e95fe21c8e0d2dd9b593e5244d7574fcff2f9ca282451a1728e097dc77653d40bda1783c4735a2c4e4de540ebc7712ae547a1a8bf622701e2e44b0e866a159e4e2058c8f28c7b02e111d1a5fca870060da104d8bd7d653a931ce01c1b609b20088125cd1a1986112ba9e4830d52e7feb60057e0fd7357bd0dcd96761538530570804aeafd40aa12afb53699e46f82bf473ea917cd83bcdbdaf3501650887a1ca1f90a1e0f8255fd0764939a96069eb0efe73c5601f6548aa2c20f0559152bad9c2266e883e86c8271666ccb5b39ffd0db6999e39143205211520091a5bcbf2c5d98a94990c5ac1149388cacd863ecef167f5b8b514f1af13c2282c322359ef685e050333c462179dac9fdc762540071d1d9a7b83636756592cbda44bbb5fb11f8b7020a7f885d846f5537b97e5d97343f4aa2143bd3476b91149e4e3c9f9df7969cf792c200592c50902b66ba600dc11f9021c019c91a84cd86817bd49f338998b1413bcd08c7bc7bbc69dbec075ffe90b66e1d59808138e762379b1977eba299ce8a8c18d2ae0642e8175609378471bc0f6f335d39f5f0f297795754d8866d09b7fd34109e6c9bbbde49b0c64bbd6674f58a956b643816515ccf246a6148fcd6ce2522144a8f139e4312827dffe8bc2010da224900476efeb75111485d5e83310263258bc5f239c9993eccb25efd7b49123908bdb4ceb6ade411ff45a36048cb996daf30864f1b7fc39824206c7763bc61e1d2ffa8f2701d57a03ed4fec822ebcda575b6ccea4401033ebcce20b72a52daff9a0d9da49bc3145254824d84768dc2e9a3a7e861144b5a857ab487f0fdbb4b3727cdbbe3635337d9e599e2501b571eb1e9a1eca6b5de0bd8c6522bee037b927b69601faa3a4a8539315140db6ad9a73a3390b3accf86cda223638ba1d0ea3a774aef3fd390ea8df79dc11ed5d39115d762bfd83cd602c43d7500c5de930f0e8fbab175d9ffb79bfa6510616cc6e89ac3a4aff27564bf36e0dd76525ffefd2eaf22966b079de135b928bad005583c6afbd862f313f72434513681cb1da6c1da1931a848a1cd2c1aaf8f542c7a9f745330498b13b1d61b417ea806e4544f2f07f06ea68410f1de8fc9f23a4c191485224a64bb6b2b63d68a22fb78d3cea48b85b037b8d71efb960195e3788e4d15c3fc249060b9aeeed34fc02ab76e3c9af6e84e3af3c1da9e37cd1ea8af537d75dd0c7f736dee35be2d50ff3b3a9a5422f5fed6e72017513880b84f947b4e3ce7ba7d9dfaf2bda3198f823eb88ee8751bb47cbc7606d81f3de3251bdec20182386de1cd394a486c242116f4b2fdcee0f563b3d6f12bd95d095c84401114334e774450495cc3783155bc2176e66c7060fc7d56b71c24302a5dc6f6d1fa5462f4f9cd88bac7f444724986f88cc35f3f41c267ac9e581257e4058e9d8ca60e0738275dbe0e29d014e35cab76ca76da1192ef95ffe99cadc32a0332eb65e9094ee02a1e542904b93698af35f11146f2220839246045936403da291b289c6b59d65600a6efaa3cfdab10e895d5ce474176099727fd05e2442e705cd2e54f06cd18b6073464987ec142dd5a61cff23f1427b63ad7bedf7e1c605f5215cd8fd33a03bd40ef9b738db30a5b523cbe751eb533798fc2ba18aa979759662de1d6c005125f02dd9e1f645f67ed6a98689fd066b3fe3d83a4089af52eabbf5bfafb8e954eea3713159d77ddd28f3b14344a933c0336c90ac0baa97b6db27cdaf652c82748da3aa3b78948d0d100b02a68193585f633de3344d2aa07c8d45dd77d964de23512d3d73f0f5e304e2ee6cacb138c6bed9b4735ec79c09ea9139bf8a6dcdbd847d87a8958a3988e2327e93913c8dc3b694cde58cd77bf70c1d379e5ee19cc17f77b45a41f38a88677fafe5e6d5e1d3677", 0x1000}, {&(0x7f0000006c00)="dac02053849f783d0244642274bc157eeb584690f6f6048b", 0x18}], 0x2, 0x0, 0x0, 0x40800}, {0x0, 0x0, &(0x7f0000006cc0)=[{&(0x7f0000006c80)="24d23f03d134bbe92bc22d8b2e3b3c", 0xf}], 0x1, &(0x7f0000006d00)=ANY=[@ANYBLOB="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"], 0x198, 0x4004001}, {0x0, 0x0, &(0x7f0000007040)=[{&(0x7f0000006ec0)="23d5d9b4f4119e412dd6c48df80d5aa64c7517ad8f3545b245c89b744a9e3348f16f5ac5e207fa3e8b24250e0dc7ca6cbfb49d192bf7846fa05228c5a9ec4cd8c60f37b4912573e70d5b89459ac96aab56f9419213720e965e38bd9c34d940e2d708be94ad1e2c912200a1a9992e514854af777f5bc0b6d3c64fa9889a7b02f3cb90a793860c813503216d83187b0a334a3ee07601efa9a553b2f9994d49156658c6c789accbd90d80d54a3bff97c2d04dbd97da", 0xb4}, {&(0x7f0000006f80)="15e40d59c460704fb2bde02b458ea0793484c88121be85ac6041a9a05adefc0ecc59068dc2ad6c8abf7d93b6588153b1177b21bdc36a7d9b1e5b3b70a7d57ae02ff1004fd5dc83cedbd61a7057308141989493f5d7b599caed3c", 0x5a}, {&(0x7f0000007000)="6309f6a268896d06e8eac7fe32925d5dc43b91b81190b55e3e249f367743a427a583af54e8302888e1b43e18d6bed0", 0x2f}], 0x3, &(0x7f0000007080)=[@assoc={0x18, 0x117, 0x4, 0x800}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18, 0x117, 0x4, 0x3f}, @assoc={0x18, 0x117, 0x4, 0x3}, @op={0x18, 0x117, 0x3, 0x1}], 0x90, 0x801}], 0x9, 0x8000) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}}) r3 = syz_open_dev$vcsa(&(0x7f0000002200)='/dev/vcsa#\x00', 0x8, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000002240)=""/31) [ 291.117704] bond0 (unregistering): Releasing backup interface bond_slave_0 11:49:18 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) r1 = getgid() r2 = getegid() setregid(r1, r2) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000080)) r3 = socket$inet6(0xa, 0x2, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='}eth0}\x00', r0}, 0x10) write$P9_ROPEN(r0, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x0, 0x0, 0x1}, 0x4}}, 0x18) getsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 291.183442] bond0 (unregistering): Released all slaves [ 291.602303] FAULT_INJECTION: forcing a failure. [ 291.602303] name failslab, interval 1, probability 0, space 0, times 0 [ 291.613842] CPU: 0 PID: 19092 Comm: syz-executor5 Not tainted 4.18.0-rc4+ #143 [ 291.621208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.630590] Call Trace: [ 291.633200] dump_stack+0x1c9/0x2b4 [ 291.636843] ? dump_stack_print_info.cold.2+0x52/0x52 [ 291.642064] should_fail.cold.4+0xa/0x1a [ 291.646158] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.651280] ? graph_lock+0x170/0x170 [ 291.655084] ? trace_hardirqs_on+0x10/0x10 [ 291.659331] ? find_held_lock+0x36/0x1c0 [ 291.663408] ? __lock_is_held+0xb5/0x140 [ 291.667493] ? check_same_owner+0x340/0x340 [ 291.671830] ? rcu_note_context_switch+0x730/0x730 [ 291.676773] __should_failslab+0x124/0x180 [ 291.681026] should_failslab+0x9/0x14 [ 291.684840] kmem_cache_alloc+0x2af/0x760 [ 291.689023] __d_alloc+0xc8/0xd50 [ 291.692498] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 291.697532] ? lock_downgrade+0x8f0/0x8f0 [ 291.701701] ? kasan_check_read+0x11/0x20 [ 291.705851] ? rcu_is_watching+0x8c/0x150 [ 291.710008] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 291.714597] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 291.719018] ? kasan_check_write+0x14/0x20 [ 291.723262] ? do_raw_spin_lock+0xc1/0x200 [ 291.727514] d_alloc+0x96/0x380 [ 291.730797] ? d_genocide+0x30/0x30 [ 291.734433] ? __d_alloc+0xd50/0xd50 [ 291.738156] ? dput+0x15/0x20 [ 291.741272] __lookup_hash+0xd9/0x190 [ 291.745089] do_renameat2+0x6ce/0x1120 [ 291.749005] ? user_path_create+0x40/0x40 [ 291.753160] ? __lock_is_held+0xb5/0x140 [ 291.757252] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.762802] ? ksys_write+0x1ae/0x260 [ 291.766614] ? __ia32_sys_read+0xb0/0xb0 [ 291.770687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.776236] ? ksys_ioctl+0x81/0xd0 [ 291.779876] __x64_sys_rename+0x5e/0x80 [ 291.783855] do_syscall_64+0x1b9/0x820 [ 291.787748] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.792689] ? syscall_return_slowpath+0x31d/0x5e0 [ 291.797633] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 291.803011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.807865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.813062] RIP: 0033:0x455a79 [ 291.816246] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.835564] RSP: 002b:00007f65167eec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 291.843285] RAX: ffffffffffffffda RBX: 00007f65167ef6d4 RCX: 0000000000455a79 11:49:19 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)=0x9, 0x4) socket$inet6(0xa, 0x807, 0x9) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000200)={0xff, 0x4, 0x6}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r3 = gettid() sched_setaffinity(r3, 0x8, &(0x7f0000000280)) r4 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5421, &(0x7f0000000000)) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="000100000000fddb40000000000000000300"], 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 11:49:19 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x10000) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000180)=0x6) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 291.850563] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000040 [ 291.857842] RBP: 000000000072bf48 R08: 0000000000000000 R09: 0000000000000000 [ 291.865124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 291.872398] R13: 00000000004c0aea R14: 00000000004d0f20 R15: 0000000000000002 11:49:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xffffffeb) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:19 executing program 6: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) flistxattr(r0, &(0x7f0000000080)=""/116, 0x74) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fp<', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r1, &(0x7f0000001000), 0xc84) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x2, 0xc00) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000002c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:19 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='memory.swap.max\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0xfffffffffffffff9) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000280)=r0) connect$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x7, {0x4, 0x6, 0x10000, 0x840, 0x20, 0x18}, 0xfffffffffffffffe, 0x100000000}, 0xe) getsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xffffffffffff1995, 0x80) openat$cgroup_ro(r2, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e24, 0x5, @empty, 0x100000001}, @in={0x2, 0x4e23, @rand_addr=0x39828105}, @in6={0xa, 0x4e20, 0x6, @empty, 0x7}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e21, 0x1, @empty, 0x10001}, @in6={0xa, 0x4e24, 0xffff, @mcast2={0xff, 0x2, [], 0x1}, 0x9}], 0xa0) 11:49:19 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:19 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x88001, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000100)={0x1, 0x6, 0x0, [{0x8, 0x1, 0x7f, 0x78, 0x0, 0x7, 0x2}, {0x2, 0x9, 0x3, 0xfaa8, 0x6, 0x81, 0x7e}, {0x3, 0xfffffffffffff7b4, 0x1, 0x0, 0x899, 0x3ab}, {0x7f, 0x1800000000, 0x9, 0x6, 0x6, 0x2, 0xa}, {0x4, 0x75, 0x3, 0x5, 0x0, 0xffffffff, 0x3f}, {0x3, 0x1, 0x7, 0x3, 0x8, 0x3, 0x20}]}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x3e1) [ 292.399648] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.406153] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.414563] device bridge_slave_0 entered promiscuous mode [ 292.460650] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.467157] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.476333] device bridge_slave_1 entered promiscuous mode [ 292.535436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 292.575109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 292.703310] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 292.758703] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 293.083746] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 293.091334] team0: Port device team_slave_0 added [ 293.128399] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 293.135978] team0: Port device team_slave_1 added [ 293.185784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.247925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 293.254824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.270414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.300502] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 293.307603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.315602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.336778] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 293.343851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.351776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.566997] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.573397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.580065] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.586443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.593727] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 294.240321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.394706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.472756] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 294.550059] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 294.556242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.563472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.638484] 8021q: adding VLAN 0 to HW filter on device team0 11:49:22 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0xfffffffffffffffd, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = dup(0xffffffffffffffff) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100007fffffff) bind$inet(r1, &(0x7f00000006c0)={0x2, 0x4e20, @rand_addr=0x5}, 0x10) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x9, &(0x7f0000000780)=[{&(0x7f0000000140), 0x0, 0xc5}, {&(0x7f0000000300)="532d2b73fee16b1617aae4612d192f98c73a78272790e0ed19ddc839c67fad92063a765c6cc413381756ad6deeb6c5b46e7c37b1e2f403fab5d522bc33467180f4981138b118bcf320c317dece2077c3b0ed075f22c4e072bf0660c06a373f2d089493f1c8f77f9681cdf46845047e61464cd54e699d81f450ec14d436cc20985b7a109bb6f10516c526642393c91f7a44be3c595c6fa97c14a19a3e92ea3bf59664dcdc160383ef431c724a7d052c5c16089d630e384a78efabe858c1", 0xbd, 0x1}, {&(0x7f00000003c0)="cbcc1d5bba1b4b27a2eaf2d412bb5dd45fe52d5719542941a2db28f503e88e65d585b932e4f97a65d0886561e02cca200a5d804f91931a9eaa5354e9f0ac2ab3e03d31902321fcf14c03cf42d2441010c61de2238e827309beec2e39dcd8ab3938cc2e3634cc7569026396498474b13f2da1cb75a0907ebc1dcc6c91213a9c8ce37393c88d7eb583f46d57597bd0568f42e8a6e739f774763e84b96c06efa74b00698be175397ac5b4dc9931e0d681ffd50a342d18658f291ef5", 0xba, 0x1}, {&(0x7f0000000180)="3c6fcafdf09dbe6f7de0188cf67ca828fedb9855b5e6d03af7cc16c4574606d803e283a06ab488eeb8fc25dfeebe674ce183f4926eaa24360e6e81b50e64", 0x3e, 0x4}, {&(0x7f0000000480)="c28fded1f3671d7c721ec57c8ff5d151bca8cd76ba05ec038a167f98e84eea6c3baf894d2df754ed3994994a0947236134e2e855992ed641ae65ffa3e4924072e76067315e43659d06bf3791a02e18caf4b55561523d12bec09033959736d45b85254b4867f7c4870d606b38e2a5a56f21c8ec12dd26368427d43f3dc6c0f3758e827e3b11f529bfe6e8993fd793c6165ba748dd5614aca9fcca8d2354bcffe4dcd6", 0xa2, 0x5}, {&(0x7f0000000240)="68ce73904979fb5301b48c34892b371a4cde6c9a1e6d456f12fd17d5ba225438f79c900e413625a01facd004e1fed4b19e2f2ec0e4f1fb5c6c94b5f1b2bb7c03cb", 0x41, 0xffffffffffff874c}, {&(0x7f00000001c0), 0x0, 0x9}, {&(0x7f0000000540)="865fcc7805c186d6f028b56fb4ce8b5dce48158899eab796c5abf28cc3988d0ed5b682a5bbf7b5e03c96963549aa3fe472ee4164628b077a417389228eb9ca15ab9ccdf98b3fd37f60ed81f544dede127338ee5d82ec5b3f221a9f8222d357d28b54ec5a4a64f197a0483564f86f931f7661edb08afd9c2800733e6ae053ece2e5256ac69f1fd4f1505273be5300a53232c08c58540d1438d6d32502a25372c725cacffbb4c307a8aa18202959bdb9c2e76f46e23f72ed9ac2d391902bdf7aa09aa2c77e4571bd0417227d0d9fe85a7980370fbffdc32b30ca8366dc5cf0c4", 0xdf, 0x7ff}, {&(0x7f0000000640)="141a285d5dcf2b40e017d4a81ee970d3ab186f5db9aa234fcb1ff4ac2faf1c4fb507b7", 0x23, 0x1}], 0x1000000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000680)={0x9, 0x425, 0x8}) 11:49:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x100000000000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x98540, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000100)={0x0, 0x8000007}) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0xfffffffffffffefe) 11:49:22 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="6272fb33ea20d7522ff9726f"], &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:22 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7ff, 0x8000, 0x2, 0xb1c, 0x51fb}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e24, 0x800000000000, @empty, 0x100}}, 0x100000001, 0xffff}, &(0x7f0000000480)=0x90) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x14) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x36f2e0d4, 0x200) ioctl$TIOCCBRK(r1, 0x5428) 11:49:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000080), &(0x7f0000000180)=0x0, &(0x7f00000002c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d, r1}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x501000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000080)) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 11:49:22 executing program 2: r0 = socket$inet6(0xa, 0xa, 0x9) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x6, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000200)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x80000001, 0x2, 0x0, 0xfffffffffffffffc, 0x8, 0x6, 0x8001, 0xf8d, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r3, 0xc3d, 0xfffffffffffffffe, 0x8, 0x4}, &(0x7f0000000180)=0x18) 11:49:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:22 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f00000000c0)='./file0\x00', 0x7ffc) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007ffffffc) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0xffffffffffffffff) writev(r1, &(0x7f0000001e00)=[{&(0x7f0000001d40)="aa784028f4e1f5089c14759b32abfee215aa1219d359d8b8c5a7e3eb5ff3a2fd64086df8b3b3fef9d7ad1ff507a475ee738aa401d5d88d9044e4fd00fcf20ab9e39c6de655d58a73e3ef8e688c3419d225ad6cef5dec47e1193bf14c956c1534182b7fc23d12196932656602aefb63954c5b69d0c6bc28f610cece1f4b24a10c343ce5d0a90afd69", 0x88}, {&(0x7f00000006c0)="631a6be89d5e04b9ba23a2c1c8d6d2189c5434667b520b5ef276b25fe61cc26cd2aacdfe5b5e3608975f3854ce75c3734d030d0094f130bffaf039cf5b7eb7675a0b42a509db007f7074dc937237088dd212cfc96f237bd5ed6fe8b58c9a2cf8", 0x60}, {&(0x7f0000001940)="3f388a55fc44ea5c3de170eac9939e192d8a1cbc42cdfd7bb0d72e402fd215709ee1a106da46b01921e8159e03670f99fa77f624bb1beb98baf43ae1c81c376ecf061e72c24b8fbe567630f328812426a5222d9592e2f131837b3313e0bc9b53183ba3f66eaeadb94c7ba1c41565448c01ff12729bead9fc797b46ad060e2cc59ff72bbc1aecb290450016fa0f24391b66f4cb39b6a5ca321ee23456bfc4e75fd3f3ceade1ae6e00341b624eb8bee55c9ca9134c4f35db2e0570", 0xba}, {&(0x7f0000001a00)="5b60ec1165c5a82cafa8780d083a88ce279162bee43ae9de91c583ec05c0c742201eb9820192bcc1002c91ff0b4cf3383edd19", 0x170}], 0x1000000000000216) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001c00)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000018c0)=0xe8) getresgid(&(0x7f0000001900)=0x0, &(0x7f0000001a40), &(0x7f0000001d00)) chown(&(0x7f0000001880)='./file0\x00', r3, r4) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000001a80)='./file0\x00', r5, r6) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x832, 0x800}, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001e40)='/proc/self/net/pfkey\x00', 0x2000, 0x0) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa, &(0x7f0000001780)=[{&(0x7f0000000180)="09fc5533e81a4eed587fa51b3dc59739e32acb5517383fe6d87c476ced6639a916f549b492c7bd99b646f803358c46a96cdc79909b43d85e1ae7b69de510816cf2713d0a06cbf5cd046c91a702c5467702ccc191fb12f1c35c696da882", 0x5d, 0x8001}, {&(0x7f0000000240)="086425e20928d254f0920279878162a9263b0db5dd41dd80a5355879e84161bcb7e943f61bc58d77", 0x28, 0x1}, {&(0x7f0000000300)="dfb0c5575a1275ec724f06f75e4e97e07468745cff912e04258311d0da206bdd10d237b011d1bb8f19d6b6db41e503a244568ba4c7d3d1c005b661e64955a49098cca767f802f9c312632441ef99fe50f94d23309321fae8f8cdfb5262aac8dfc528dd13d9dec474d5b9257b919509b6395ef77b9efe4521434cb74019a53f614ea37b3ac44f45303019daee97ad2295aba8031b240c4243e78bc25889fb8ab39cb437faef5a439e4c1049c51c7d91de1be30e0afe29e9e36b61ecb82c84129b97c8c08ddd3d4b4ed01af060094b935cec7075b38c6523e7b3193fb5e8fe679e83108382e45cf2c926957f215d86e0", 0xef, 0x1}, {&(0x7f0000000400)="308cacf6b8a3b95080d745118cfc9800179e3aaffd4a121d03d5879a030091774fbfa59b8e9ebcfe163fa59cfb22bd46bb1e13e2ba6eb69c392edb0cb04edd4c1c899b15a35e2ce184710e", 0x4b, 0x2}, {&(0x7f0000000480)="65ecbb7694e8027db9518939beee236fd3bec8dfa3b4aae909ad5276c655921f41bd74f2b8f308d106cb8b186b67bae05fb0731934608da717c6b5ce5014cbb94904cd4959764e73f361c9d1298ff223001d4df7c60064c518b6edc59089481479d06bbb8e7e9e737bd4b29e1adcd006ad1069887fc42e50941d7ec5f6b863c522d2a814d949c228da4683b116aee55ce3668c96b12a443416e9", 0x9a, 0x2}, {&(0x7f0000000280)="ad8fd51952e8ccde48", 0x9, 0x2}, {&(0x7f0000000540)="2b55f5feb2db298d39ff70ff212ccc1b33e72a91063910abc2bde24cdc82ca9c6da9463d7444c215e9c46782adf5c3ede1bd67274d5f7aa6", 0x38, 0xffff}, {&(0x7f0000000780)="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", 0x1000, 0x1cb8}, {&(0x7f0000000580)="5262bea6e6d3861082c204e1a6f2d3b46346d0d520586ec94e1b772ec8b41890b3a7a90bd579311b647258504edd85f9815e2aaef1302273e1ce126b858dd474109142b05c9d191a918729e80acff6eb3a6ceb82328e7a54a6887374aa5b4534fd84bc2d0ffbc0051a1223dcc026b1b4cd3d0704d97894c5c8ed40195f0229ebd20705c41dd722ee77aa552d4edc838d56f57feacdc10286aae91f9b30a7151c37a9ccc3d8116f89652d49ae104574a98ef14bfdf5a711123c71489b457af140ecc7c26499e926c97e53080e0fd1b38907ddfb", 0xd3, 0x401}, {&(0x7f0000000680)="0f55dc", 0x3, 0x7ff}], 0x2000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) [ 295.341309] device bridge_slave_1 left promiscuous mode [ 295.347073] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.367557] device bridge_slave_0 left promiscuous mode [ 295.373330] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.399187] IPVS: ftp: loaded support on port[0] = 21 [ 295.428166] team0 (unregistering): Port device team_slave_1 removed [ 295.441007] team0 (unregistering): Port device team_slave_0 removed [ 295.451830] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 295.469970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 295.502312] bond0 (unregistering): Released all slaves 11:49:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x1400000000000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:23 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f00000006c0)={0x6, 0x5, 0x2, 'queue0\x00', 0x78}) recvfrom$inet(r1, &(0x7f0000000340)=""/152, 0x98, 0x2140, &(0x7f0000000180)={0x2, 0x4e21, @rand_addr=0x100000000}, 0x10) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="62745c03e36541ee4a457266732ec0f899ae52b32b70726f6300c9707621f3e279a7759ec4b0e7749756f6c73a621045924c55742c493d93da1850988e555ef01d9f8c8e127e595c8f0916054b9bcf6c3bf4fa80f0d876f783b088727323dc763d9ccbf386ab320130956a2199258b8d482bd64b28ba54e552fec3834818155aa98344b18f1c7bab357024f2415b73649b572f2aa913d99fc3472970d425d9412c9dd30c28fb485ad64496f8e9a07baed742b7d7ed825ec4db33d951ef2c65a596fb3b0c6d9e6965d0f5d0143b41660077baf795e4c2e55aef1e67ad896fe2406811d4f0cb9fd3"], &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000480)={r2, @in6={{0xa, 0x4e22, 0x9b9, @local={0xfe, 0x80, [], 0xaa}, 0xfff}}}, &(0x7f0000000540)=0x84) stat(&(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000340)={[{0x9, 0x0, 0x100000000, 0x9, 0x295, 0x7f, 0x9, 0x0, 0x8, 0xd30, 0x3f, 0x0, 0x5}, {0x1, 0x3f, 0x100, 0x5, 0x0, 0x5e8, 0xffffffffe818ed4e, 0x1, 0x1ff, 0x4, 0x37, 0x9553, 0x401}, {0x80000001, 0x9, 0x100, 0x0, 0xffff, 0x2, 0x101, 0x0, 0x1, 0x5, 0x80000001, 0x90db, 0x1}], 0x2}) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 11:49:23 executing program 2 (fault-call:11 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) 11:49:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="10020000feffffff0800000000000000000000000000000002000000000000000600000000000000030000000000000008000000790000000100000000000000010000000000000006000000000000000600000000000000fbffffffffffffff0000000000000000b3380000030000001f0000000200000004000000", @ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="090000000200000000000000000000000000000004000000000000002700000006000000246367726f7570295b760000786e657430776c616e31776c616e316c6f246d643573756d47504c00020058e3190846183915ef000000000000020000000000000005000000000000000300000000000000090000004a000000000000000100008000000000ff7f000000000000ad00000000000000ff07000000000000070000002e20c2b1000000000000000000000000000000", @ANYRES32=r1, @ANYRES32=r4, @ANYBLOB="0010000007000000000000000300000000000000ff03000000000000080000000900000067726f75705f6964060000000000000001000000000000000200000000000000060000000000000003000000070000000300000000000000233f000000000000070000000000000009000000000000000300000000000000020000000000000000000000050000000700000009000000fffeffff", @ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="0400000000800000000000000000000000000000f8ffffffffffffff02000000810000006664000000000000"], 0x210) fallocate(r0, 0x0, 0x6, 0x704) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000180)=0x4, 0x4) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 296.468096] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.474541] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.482471] device bridge_slave_0 entered promiscuous mode [ 296.522106] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.528575] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.536488] device bridge_slave_1 entered promiscuous mode [ 296.579734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 296.631449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 296.776153] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.835097] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:49:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x200000000000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:24 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x4, 0x1, {0x7, 0x1b}}, 0x50) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x301000, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, r1) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 297.077219] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 297.084809] team0: Port device team_slave_0 added [ 297.138681] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 297.147135] team0: Port device team_slave_1 added 11:49:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 297.198059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 11:49:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 297.275452] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:49:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 297.348142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 297.356561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.371489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 11:49:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x8}], 0x1c) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 297.433462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 297.441629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.450926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 11:49:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00c0b9f42f28cf9027b4b52bb89c0d7050b7abc731268c6b24300de7ef5e454a01fb0fc8c4015a9ad2c0fd39d0b3c0f59a7692151ca92c425eb4b30985c3b782ea0e0d43201b10a29e5765c88b245be1d6d8a7bb3864bee0aadc71bff94f08a803cc9793128d2978b6c179b5810420bcb65a5b6c6233b0160fe4cc79519640e0656d8b94eba310104e71d9af9e06137e4efae49362d90aa9cd8ba32fd7fb774e2a038b28a0293cb0a652"]) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) fcntl$lock(r0, 0x7, &(0x7f0000000200)={0x2, 0x3, 0x1000, 0xafe, r1}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 297.907212] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.913641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.920310] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.926711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.935104] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 298.297186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.900352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.978116] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 299.055543] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 299.061703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.068789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.141860] 8021q: adding VLAN 0 to HW filter on device team0 11:49:26 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1, 0x28) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x41) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:49:26 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) removexattr(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)=@random={'btrfs.', '\x00'}) 11:49:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200400, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) 11:49:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x14000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) r1 = memfd_create(&(0x7f0000000080)='/dev/fuse\x00', 0x3) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000180)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0xfffffffffffffdef, 0x0, 0x4}, 0x18) 11:49:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fe77"]) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f0000000580)="88707070306d696d655f747970652400", 0x10, 0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x140, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}}, [0x42de9959, 0xffffffff, 0x6, 0xc, 0x0, 0x100000001, 0x9, 0x3, 0xdea, 0x4, 0x5, 0xfffffffffffffffb, 0x1, 0x9]}, &(0x7f0000000340)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={r2, 0x4}, 0x8) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x2000, &(0x7f0000000340)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d}, 0x2c}, {@sq={'sq', 0x3d, 0xfff}, 0x2c}, {@timeout={'timeout', 0x3d, 0x9}, 0x2c}]}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:26 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000100)={0x5, 0x24, &(0x7f00000000c0)="391a4d52ed6f4dad827e7afac1582f6bb62021a3bb348e9411b948cf3539fb964aa92db7"}) [ 299.862958] IPVS: ftp: loaded support on port[0] = 21 [ 299.887440] device bridge_slave_1 left promiscuous mode [ 299.893167] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.905842] device bridge_slave_0 left promiscuous mode [ 299.911489] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.953761] team0 (unregistering): Port device team_slave_1 removed [ 299.965854] team0 (unregistering): Port device team_slave_0 removed [ 299.975874] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 299.989386] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 300.017410] bond0 (unregistering): Released all slaves 11:49:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x4000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:27 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x40588}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',Gaoup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x4000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x40, 0x0) sendmsg$rds(r1, &(0x7f0000000940)={&(0x7f0000000180)={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000340)=""/71, 0x47}, {&(0x7f0000000480)=""/255, 0xff}, {&(0x7f0000000580)=""/188, 0xbc}, {&(0x7f0000000640)=""/123, 0x7b}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/184, 0xb8}, {&(0x7f0000000780)=""/165, 0xa5}, {&(0x7f00000002c0)}], 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="300000000000000014010000030000005d9a721c55b2f31cc5602bd0721ddf944cf97599368f4a39ee382e03c65214f00c5fc1acacff1f2fbb2b661a072917900de65b98451cafeb4cd02cdc5be0a0e158d1c4ca2596fee93a42d9553424b0c84d9c51412eac523ed9a444fc53f61807c8e2685d16f66c9c1ce14fb686f9e3429eb0f00afa4f31729e46fdb385b2cb34849ebfd82ad2", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='.\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB='\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x30, 0x40}, 0x4000000) 11:49:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x20000398, 0x0, 0x4}, 0x18) 11:49:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 300.999546] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.006056] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.013707] device bridge_slave_0 entered promiscuous mode [ 301.053759] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.060261] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.068235] device bridge_slave_1 entered promiscuous mode [ 301.114401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 301.162939] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 301.317352] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.361469] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:49:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xf000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:28 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x1ac, 0x181200) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000002c0)=&(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000340)={0x2c, 0x3, 0x0, {0x1, 0xb, 0x0, 'fd'}}, 0x16) bind$bt_sco(r1, &(0x7f0000000780)={0x1f, {0x0, 0x7, 0x9, 0xe8fb, 0x6, 0x4}}, 0x8) accept$unix(r1, &(0x7f0000000680), &(0x7f0000000700)=0x6e) write$FUSE_ENTRY(r1, &(0x7f00000005c0)={0x90, 0x0, 0x5, {0x1, 0x2, 0x5, 0x400, 0xe5, 0x8, {0x0, 0x2, 0x101, 0x2, 0x8, 0x0, 0x0, 0x9, 0x3, 0x0, 0x4, r2, r3, 0x1bc, 0xc0c}}}, 0x90) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x7, {0x7, 0x1b, 0x8, 0x8, 0x4, 0x0, 0x5e, 0x42d}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) clock_settime(0x7, &(0x7f0000000740)={0x0, 0x989680}) quotactl(0xa1fe199, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000030c0)="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") [ 301.491983] [ 301.493657] ================================================ [ 301.499446] WARNING: lock held when returning to user space! [ 301.505236] 4.18.0-rc4+ #143 Not tainted [ 301.509284] ------------------------------------------------ [ 301.515068] syz-executor7/19905 is leaving the kernel with locks still held! [ 301.522243] 1 lock held by syz-executor7/19905: [ 301.526900] #0: 00000000ec3d173f (&fi->mutex){+.+.}, at: fuse_lock_inode+0xaf/0xe0 [ 301.612729] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 301.620223] team0: Port device team_slave_0 added [ 301.647316] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 301.654642] team0: Port device team_slave_1 added 11:49:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1400) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 301.681314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.708180] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:49:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_J0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/236, 0xec}, {&(0x7f0000000340)=""/119, 0x77}, {&(0x7f00000000c0)=""/61, 0x3d}, {&(0x7f0000000580)=""/225, 0xe1}, {&(0x7f0000000680)=""/225, 0xe1}, {&(0x7f0000000780)=""/190, 0xbe}, {&(0x7f00000002c0)=""/4, 0x4}, {&(0x7f0000000840)=""/190, 0xbe}, {&(0x7f0000000900)=""/131, 0x83}, {&(0x7f00000009c0)=""/183, 0xb7}], 0xa, &(0x7f0000000b40)=""/252, 0xfc, 0x2}, 0x100) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0xfffffffffffffe8c) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f00000002c0)=0x80) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ppoll(&(0x7f0000000340)=[{r2, 0x4000}, {r1, 0x2}, {r0, 0x2000}], 0x3, &(0x7f00000003c0)={r3, r4+30000000}, &(0x7f0000000480)={0x8001}, 0x8) [ 302.083730] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.090128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.096745] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.103117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.110558] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.816116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.866475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.928308] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 303.005274] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 303.011689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.018916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.073322] 8021q: adding VLAN 0 to HW filter on device team0 11:49:30 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20000000, 0x100) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) 11:49:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0xf, 0x0, 0x4}, 0x18) 11:49:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x40280, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000005c0)={0x0, 0x4d, "468c3af3c5556beaab689e4f4cac8f655c423c4815624f2fc3eb9901309dc8ea53bbeb254ad292dd5c2b7c71d1bb518d4ea1d0979d000b629eaa879ca84c3c64db0e7c8433502500aeb3a45c31"}, &(0x7f00000003c0)=0x55) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000640)={0x2, 0x8000, 0x1000, 0x7, r6}, &(0x7f0000000680)=0x10) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r7 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x400000) rseq(&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1, 0x3ff, 0xb8ec, 0xcb}}, 0x20, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r7, 0xc0bc5310, &(0x7f0000000500)) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000880)='/dev/rtc0\x00', 0x4080, 0x0) fcntl$getownex(r7, 0x10, &(0x7f00000008c0)={0x0, 0x0}) r10 = getpid() r11 = getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000900)=0x0) sendmsg$unix(r5, &(0x7f0000000a00)={&(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000740)="a9d0eebfa02edd8ebe79e4998cdcb18aaad627b8dd4bf7f0a7e90dd087fffdcb54c423b609", 0x25}, {&(0x7f0000000780)="b861f4c8c81f2ba63ce03b4abd915454d4f786c89e3197c78319c38ab6ac6de173ff27a85c991f29f323e4a46951aac18b24aab07a1496ab88e2ec4fb3d972ba31c85ec902968545d762f8a141183c29a8edf110c365bffc7e980a4d92e3dd173e145b3abb076b5b3fb56bbb01f9059a149f360668a353aee296e1f26e8b9a0cb4b07a3d5103a921e43c42c87fb5ba382351ff52e296863bfececaff174f2b825b4d2cc595c9868db05ef16b49fc74ea", 0xb0}], 0x2, &(0x7f0000000940)=[@rights={0x20, 0x1, 0x1, [r8, r0, r7]}, @cred={0x20, 0x1, 0x2, r9, r3, r2}, @cred={0x20, 0x1, 0x2, r10, r3, r4}, @cred={0x20, 0x1, 0x2, r11, r1, r4}, @rights={0x20, 0x1, 0x1, [r0, r0, r5, r0]}, @cred={0x20, 0x1, 0x2, r12, r3, r4}], 0xc0, 0x8000}, 0x20000000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0xfffffffffffff000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffe) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:30 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x31, 0x6, 0x0, {0x4, 0x0, 0x8, 0x0, 'group_id'}}, 0x219) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="900000000000000002000000010000000000000000000000000000000b00000000000900656d316e6f6c6576656d3100000000000000008bf66c50e1e336450000000000f8000000000000002c00000000000000000000000000000000000000000000001e000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x35) 11:49:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643dbd2755bec26a3a7240c237855aef4f0adcabdccc1487082de8d2bcc60ede9a062c9965fce0678d578f6b71c1cc1bb982d23996163e380b0130741d428678eedcbb8e676c16d712cd314a85eb488d723a9378e265bd973db701d0f84281d5d95ba86bd8e7d04679ebc1425cc164d6c76a57864e932d182d858e75842a2ac5b5d8c602898bc231b14fbef82ade97942483cc5caff6743c53e100291c49a9dcb2e0672615c4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67646f750c5f163f3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x404000, 0x38) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000680)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) socketpair$inet(0x2, 0xa, 0x8, &(0x7f00000000c0)={0xffffffffffffffff}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x410, &(0x7f0000000680)=ANY=[@ANYBLOB="cbc140087f2bfa78aa656a5e1290a88bbe5624f7887ae65f790a6144608dd660c47b711d0683be2b1892ac5ede201fe12c7157ccfcbde1d67811d9075c638da2d2d819e03877534a9b4e9a779971f933d43b1f4f91e09bf68f328ddefe3de4789fd6d3b5bc26ca0f5f360b1fab7c4145ac5f3352f5110ab4fcec2a056a8c339ce614381dbadbd1a04f302c4b618f62ab9a7b57d7affcb44d722e14261e89", @ANYRESHEX=r0, @ANYBLOB="e8721cb95295d450b5d96f6f746d6f30303030303030303030dbb10cac156987b8fbaba9963030300330", @ANYRESDEC=0x0, @ANYBLOB="2c67726f7500c269643d", @ANYRESDEC=0x0, @ANYBLOB="2c80c0a37fbf4d4b6edda49faa709ce88fcb070b110230a7a4bfce02b995ef4b302fff86549c62e348c66562528faece880d37b1538481a7c13c0a5e2adbde60084a6a50ef000000000000000000000000be8af4eafa016f4f8ba2d29b11ea95bf"]) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) r2 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x9, 0x200000) mkdirat(r2, &(0x7f00000003c0)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x8}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000002c0)={0x10, 0x0, 0x2}, 0x10) r3 = dup3(r0, r0, 0x80000) getsockopt$inet6_buf(r3, 0x29, 0x23, &(0x7f0000000040)=""/60, &(0x7f0000000080)=0x2cb) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000400)=""/182) read$FUSE(r0, &(0x7f0000003000), 0x1000) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000001c0), &(0x7f0000000340)=0x4) 11:49:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2000, 0x0) statx(r1, &(0x7f0000000180)='./file0/file0\x00', 0x4000, 0xfff, &(0x7f0000000480)) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 303.451259] syz-executor6 uses obsolete (PF_INET,SOCK_PACKET) 11:49:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmo)e=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000004000), 0x13bb) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0xf9) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:30 executing program 3: mknod$loop(&(0x7f0000000480)='./file0\x00', 0x0, 0x1) truncate(&(0x7f0000000180)='./file1\x00', 0x100000000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x480000, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x100) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FIBMAP(r2, 0x1, &(0x7f00000000c0)=0xe6) keyctl$chown(0x4, r3, r4, r5) sendfile(r0, r1, 0x0, 0x100007fffffff) r6 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x40086602, &(0x7f0000000000)=r6) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x4e22, @rand_addr=0x81ba}}, 0x2, 0x6, 0x81, "61fa58fb9b124c7aa93615ae0abfb0b6361bb3df6daafb05848185da042eb52cdd84779cf84f11f8745080a06ce631576d566e937efe940e0bc32ee6a39da227cb38fb079044c4b0cc8dd8820b41d2e5"}, 0xd8) 11:49:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 303.561340] device bridge_slave_1 left promiscuous mode [ 303.566910] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.582939] IPVS: ftp: loaded support on port[0] = 21 [ 303.588375] device bridge_slave_0 left promiscuous mode [ 303.594154] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.618587] team0 (unregistering): Port device team_slave_1 removed [ 303.627277] team0 (unregistering): Port device team_slave_0 removed [ 303.636739] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 303.651398] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 303.674259] bond0 (unregistering): Released all slaves [ 304.182541] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.189060] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.196215] device bridge_slave_0 entered promiscuous mode [ 304.220930] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.227323] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.234311] device bridge_slave_1 entered promiscuous mode [ 304.259895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:49:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) restart_syscall() r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 304.285997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 304.333032] Unknown ioctl 21519 11:49:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1400000000000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 304.367856] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 304.404253] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:49:31 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x100, 0x200000) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000180)) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="5b643d09a24d5fca542c75b50b8c672d88feeb0000000000008596128b2e069e0cdde87d32331dff", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") unshare(0x400) r2 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r2, 0x10c, 0x2, &(0x7f0000000240), &(0x7f0000000000)=0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) mount$9p_virtio(&(0x7f0000000080)='fuse\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000002c0)='9p\x00', 0x11400, &(0x7f0000000400)={'trans=virtio,', {[{@cache_mmap='cache=mmap', 0x2c}]}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0xfffffdef, 0x0, 0x4}, 0x18) 11:49:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 304.557245] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 304.565388] team0: Port device team_slave_0 added [ 304.575162] Unknown ioctl 21519 11:49:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x401, 0x420081) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000080)={0x6, 0x1f, 0x3f}, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) connect$netlink(r1, &(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x400800}, 0xc) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x200, 0x0, 0x0, 0x1, 0x1}}, 0x42) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}, 0x2c}]}}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) [ 304.622853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 304.634140] team0: Port device team_slave_1 added [ 304.683433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.709211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.733215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.758246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.977407] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.983879] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.990502] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.996861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.004062] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 11:49:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) dup2(r1, r1) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'gre0\x00', 0x3f}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:32 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x7}}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x14000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:32 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x1, 0x99e, 0x2, 0xffffffff, 0x80}) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0xf, &(0x7f0000000500)=0x19f, 0x4) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000000000b00000000000000656d316e6f64657665ff07000000000000876c47a1f51f0222cd00000000000000000000000000000000000001000000000000002c000000000000000000000000000000000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000000000000000000000"], 0x90) 11:49:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fP=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0xffffffffffffff2f) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x242000, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) creat(&(0x7f0000000180)='./file0\x00', 0x45) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)={{0x10b, 0x0, 0xbf3d, 0x42, 0x263, 0xfd, 0x2cf}, "d83416929fc07d704b582320002d4c738912942dc243074742", [[], [], [], []]}, 0x439) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) timer_create(0x1, &(0x7f0000000080)={0x0, 0x28, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f00000002c0)) [ 305.888105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.932349] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.003603] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 306.080677] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 306.087737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.095257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.171746] 8021q: adding VLAN 0 to HW filter on device team0 11:49:33 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x200802, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x10000) 11:49:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0xfdef, 0x0, 0x4}, 0x18) 11:49:33 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) r2 = geteuid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f00000000c0)='./file0\x00', r2, r3, 0x500) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) poll(&(0x7f0000000040)=[{r0, 0x8000}, {r0, 0x66}, {r0, 0x200}, {r0, 0x2}, {r0, 0x1001}, {r0, 0x40}, {r0, 0x8230}], 0x7, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:33 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x6, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x4e22, 0xffffffff00000000, @mcast1={0xff, 0x1, [], 0x1}, 0x3}}, 0x7f, 0x8000, 0x7, "21f07fd60487d20779d72789547f4942a862b7e8a34d7d01920578b38230c73d057d3daf9bdd370448d109a8ede5ae001c3a6b2140fdba8aa8d155eac3618126737744ae33a321095899ffaa09e8632d"}, 0xd8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2) write$FUSE_LSEEK(r1, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) 11:49:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000020c0), 0xfffffffffffffe92) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x4000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:33 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) r1 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@can, &(0x7f0000000040)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000002c0)={0x2, [0x0, 0x0]}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000380)={r2, 0x4, 0x401, 0x2}, 0x10) 11:49:33 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000140), 0x1) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0xc0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100007fffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {r3, 0x8, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x12}, 0xfffffffffffffff8}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x118) r4 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x40086602, &(0x7f0000000000)=r4) write$P9_RREADLINK(r4, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 11:49:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0xa0) [ 306.712378] IPVS: ftp: loaded support on port[0] = 21 11:49:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72746d6f64653d303030303030303030303030303030303030343030a830363cd40e7566bd353d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="666bd1", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='illinois\x00', 0x9) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ftruncate(r0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 306.769402] device bridge_slave_1 left promiscuous mode [ 306.774952] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.787372] device bridge_slave_0 left promiscuous mode [ 306.793151] bridge0: port 1(bridge_slave_0) entered disabled state 11:49:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 306.841365] team0 (unregistering): Port device team_slave_1 removed [ 306.853908] team0 (unregistering): Port device team_slave_0 removed [ 306.863950] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 306.882446] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 306.911567] bond0 (unregistering): Released all slaves [ 307.330759] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.337201] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.344199] device bridge_slave_0 entered promiscuous mode [ 307.375591] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.382053] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.389855] device bridge_slave_1 entered promiscuous mode [ 307.418628] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 307.448673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:49:34 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000000000009,default_permissions,default_pereissions,blksize=0x0000000000000000,max_read=0x0000000000000100,allow_other,allow_other,max_read=0x0000000100000001,\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x1af9, 0x108004, 0x73, 0x4, 0x4, 0x6019a888}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffff, 0x428000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r1, 0x3, 0x1, 0xfff, &(0x7f00000002c0)=[0x0], 0x1}, 0x20) 11:49:34 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x134}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 11:49:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='%\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x8000) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000240)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$P9_RLERROR(r0, &(0x7f0000000080)={0x13, 0x7, 0x1, {0xa, '/dev/fuse\x00'}}, 0xffffffffffffffed) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x100, 0x400000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 307.527245] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:49:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) [ 307.581791] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:49:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='I\x00']) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x60, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000000c0)) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x3f000000, 0x4}, 0x18) 11:49:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x11) r0 = gettid() ptrace$peek(0x1, r0, &(0x7f00000002c0)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd-', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$nl_crypto(0x10, 0x3, 0x15) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000000)={0x2, 0x10001, 0x9, 0xffffffff, 0x20, 0x1}) read$FUSE(r1, &(0x7f0000001000), 0xc84) read$FUSE(r1, &(0x7f0000002000), 0xfffffd70) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 11:49:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000180)={0x0, 0xf175, 0x6e8}, 0xc) 11:49:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000000000000000000265e7ceb84b6280cbd203ab3b3ac0f1361da2aaddbcdc0846a36d7c541f682eb3a81c7df6291e36b218dd9c57fa6d89f2f6233cce8dae16c279df9aeb5a7ff80ccde5525b5480fd307101f8e866ac3ab5f44bb13005c74c03000000c5c36c8555c95bef8f36e8684a7d37e470dc7fac7286730795eac5acfd082ab0fcac6c49ea256c3f4d1873fc8497d8cc67bd954932", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000240)={{0x101, 0x399b}, 'port0\x00', 0x41, 0x0, 0x63e3c853, 0x3, 0x9, 0x8, 0x8, 0x0, 0x3, 0xab}) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000000c0)={0x3}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) r1 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x2, 0xa0200) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000480)=@security={'security\x00', 0xe, 0x4, 0x338, 0x1a8, 0xd0, 0xd0, 0xd0, 0x1a8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x4, &(0x7f0000000340), {[{{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x10001, 0x5c, 0xfffffffffffffffb}, {0x9b, 0x6938, 0x5}, {0x8, 0xfffffffffffff3c0, 0x5}, 0x20, 0x2}}}, {{@ip={@broadcast=0xffffffff, @dev={0xac, 0x14, 0x14, 0x1c}, 0xffffffff, 0xffffffff, 'irlan0\x00', 'ipddp0\x00', {0xff}, {0xff}, 0xaf, 0x1, 0x8}, 0x0, 0x98, 0xd8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x80000001, 0xb21d, 0xfffffffffffffffd, 0x20, 0x4, 0x3ff, 0xd95, 0x8]}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="fa183b2dbefc", 0x6d2, 0x0, [0x35, 0x7, 0x25, 0x27, 0x24, 0x10, 0x1b, 0x32, 0x30, 0x5, 0x18, 0x25, 0x23, 0x35, 0x13, 0x7], 0x0, 0x4, 0xf7}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x398) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0xfffffffffffffecc) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00', &(0x7f00000000c0)='\x00', 0x1, 0x1) [ 307.797905] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 307.816306] team0: Port device team_slave_0 added [ 307.861662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 307.868733] team0: Port device team_slave_1 added [ 307.893251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.918130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.944091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 307.951203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.964860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.987172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 307.994510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.002803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.220552] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.226953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.233575] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.239939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.247165] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 308.960129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.046485] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.109403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 309.172351] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 309.178503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.185448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.246389] 8021q: adding VLAN 0 to HW filter on device team0 11:49:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000140)=[{}, {}, {}, {}], 0x4, 0x9, &(0x7f0000000180)={0x4c10}, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x81, 0x0, 0x0, 0xa3bb}}, 0x209) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) bind$vsock_dgram(r1, &(0x7f00000002c0)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) 11:49:36 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x121100, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f00000005c0)=""/203, &(0x7f0000000180)=0xcb) 11:49:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r1 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x5, 0x101000) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000240)=0x0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f00000000c0)='\x00', &(0x7f0000000300)='fuse\x00', 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030ad30303030303030010030303032303b373737402c7529390ac569643d8d003ce9baae146b89b5ccb33ec618cc2dc508e9fbc099300bb0e08d3aa9fcf2e41deef687ff6de449130b8d8dd695878ab374d89649bbd7a7e61694743ad197608bcef5cff5fa9aaa3e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x4000, 0x4}, 0x18) 11:49:36 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0x8000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100007fffffff) r2 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x40086602, &(0x7f0000000000)=r2) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x88, 0x1}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e23, 0x7, @local={0xfe, 0x80, [], 0xaa}}}}, 0x84) epoll_create1(0x80000) 11:49:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fS=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x2200004, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}, {@allow_other='allow_other', 0x2c}, {@max_read={'max_read', 0x3d, 0x2400000000}, 0x2c}, {@allow_other='allow_other', 0x2c}]}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) fstatfs(r0, &(0x7f0000000040)=""/62) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) syz_mount_image$hfs(&(0x7f0000000340)='hfs\x00', &(0x7f00000003c0)='./file0\x00', 0x9, 0x7, &(0x7f0000000ac0)=[{&(0x7f0000000600)="7b48d3c008fa5f50d80e1f1a7348942aa8e94f703c8832c3c2750034352d7975ca2b2b3d11bae19f101bd512e290c0db88f8141eb9e2a9e791a0c80be057d5dfa9d3e770ac3b36e9ecb4c30e5bac9706933c5e02ead6fa36dedba82337804a9c80f53d765bfd5f257c56855f95739075138c542b9efaff8296a0e38b6cd5d9679ad8a3e587da38b4ee91983b56c10476755c6017ca53974598409a13f3fd6341180938d99bf22d8991eb6fed60d1f8057a98e44068d5f6c322edf51b6c6da112226d", 0xc2, 0x20}, {&(0x7f0000000700)="ae36212e5aeb10004eef4632c282f4d0a79bf2d00c3be9aa0cf4bc1f460a3b8b325e061ac73952dd33b14cdfd004374b9b6a0df37b6302989a2e4f84461f07a66832259beba0ac0b09b1a151565beb2ff332aabb425ec9da4937a62481364a6470fb280aea9997c5099141d9498cb76b20a63bba", 0x74, 0x9}, {&(0x7f0000000780)="886d9e0d2bfb1e3fe7f7493bc61a27085d42e37cab3e25751d407c1e5e6238cef884f08244024c6fddb0ccddbe7074147ae3d0669e547e0eb415bdd31e76433cceeb7800149b18960d9c9c166d1815538065113cfdbf9b41293b700593afc78157c70e21ed699584d7547e8ab58f4de60c3e1336e12aeb1af7483426683aece2cb00420edfbe5e30cbaa5ceedaacc7ff31d1a56741563a2c2427d1e97b337a76613f3dea7b59c47208845d6bc7c041a50240d21ef569d6320705008792d969ed1d42081d563f792621f437162ad8", 0xce, 0x10001}, {&(0x7f0000000880)="1319fd303b17235abe80995a4a6ab87b4ea16466a97908a45767b130604f3258cf0928b2a72bd37d4b9da3b2824c37f86d811083bcaa2481690adb9ce3e6961b1517cb5ab9c58399db2f02bd93bb8bca5898beb26a2508add274572a48b3f74437819c57259609e9ae86cf5c82e1827467609f75f045cb3295fd1f78d30aa1dda7f9ed", 0x83, 0x2eca}, {&(0x7f0000000940)="fef1c0cef7edc0420442f1b1b15852fdedfc958dcd0521f1ff7ff306a9e36b64908c668a818e88be48b2bc658addcb83d9aec249cb05a412f7c67e914fda6a8594f8d99191ee289e4645db4b44caf9", 0x4f, 0xfffffffffffffff7}, {&(0x7f00000009c0)="6cc67575ff99dc9830c9630a65573604ff0b7a1f7619d2c314062b0b4c5ae594c20659843f897125190606e481b93547571c4b18724a04b35bdd3e3b5f16417171a2922414991386f73a9cda65b6d524efecf909062f987d74b7b998d2627b758be7be43bfafb88f21bbeb8dff4d3bb2", 0x70, 0xfffffffffffffffa}, {&(0x7f0000000a40)="8158197eeb7ffd0354011133ff51e57899d860931767405f8c87f1bd5c137bf05f18e83a4ca21aa31b42d5ac6c97011d6bbd85fe05c01d8ff0371e4260105ce6047133fa3c1736ec3769dfa0667ac0a93649d442ef49056b7dd1ffaf70f408808cb4d203e40a753f974b5bdcbff6f9347655cc9774c7595768a2ba7f", 0x7c, 0x8000}], 0x20000, &(0x7f0000000b80)={[{@part={'part', 0x3d, 0x3d1}, 0x2c}, {@part={'part', 0x3d, 0x1000}, 0x2c}, {@umask={'umask', 0x3d, 0xff}, 0x2c}, {@codepage={'codepage', 0x3d, 'iso8859-1'}, 0x2c}, {@part={'part', 0x3d, 0x90d}, 0x2c}]}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/zero\x00', 0x30000, 0x0) exit(0x80000000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000c40)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x5}}}, &(0x7f0000000d00)=0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000d40)={r4, 0xba, "9c5459162f05b198bddb25777ed272f44cdb86910ef812f88370aca2119795e8236052918f6ea1184a6beece1fc08f0de4d7cbc3d1f93920626afd7a19d857b896a9fa2893ebe671681233b3c43aa7b11ea3e2651f32ba242a26d7edfa2dd5a2ddb94ea41c1a1bd7e9eaa9fda2db3b405ea4972dbec495b0f49fa18ee74e39ef17d47ffccb8727cba1c2a36809991e7bd7dc0f9554774c6b14b48790260f54f318ac495f6d751cc0473be4e7a3d3989e60c803ea9943238b077c"}, &(0x7f0000000e40)=0xc2) 11:49:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18, 0x1}, 0x18) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)=ANY=[]) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f00000001c0)='./file0/file0\x00', 0x40000000000200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000200)={0xfffffffffffffe43, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x8000, 0x0, 0x0, 0x2}}, 0xffffff02) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x90) 11:49:36 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000040)='./file0\x00', 0xa9) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x401, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100)=0x1, 0x4) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000140)) bind(r0, &(0x7f0000000240)=@ethernet={0x6}, 0x80) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000180)) sendfile(r1, r2, 0x0, 0x100007fffffff) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x40086602, &(0x7f0000000000)=r3) ioctl$KVM_GET_FPU(r3, 0x81a0ae8c, &(0x7f0000000300)) 11:49:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3ff, 0x2, &(0x7f0000000340)=[{&(0x7f0000000240)="93dfd135d3d61b8dc6d114b6bba46ea3e59e38f1a9c5f81d73bd63e380f76026883cc3814b2fac4d292098c43993eddf95fe7cf01553ca050b9ec929ab7b4b1f144edb57fe80a67a4d4e20fa2d60a5aa67ddcf7edff172b5083d197a685669012f8199112dc86a2709f44265db9a65ffc7460e6427b51a3fa3fe080f7b6c315331503460f716a62637a91dd046e4397f644dfbf0de", 0x95, 0x5}, {&(0x7f00000001c0)="6892749061ee3ea26d5ce2675b58857e0d5e9a003b35b72e59b0be3fea637875385c1dfbab9fc873b154168dbc3d876beaf59d2f05", 0x35, 0x1}], 0x108000, &(0x7f0000000380)={[{@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation', 0x2c}, {@data_writeback='data=writeback', 0x2c}, {@nouser_xattr='nouser_xattr', 0x2c}, {@noattrs='noattrs', 0x2c}, {@tails_on='tails=on', 0x2c}]}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) [ 309.801249] device bridge_slave_1 left promiscuous mode [ 309.806851] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.816311] IPVS: ftp: loaded support on port[0] = 21 [ 309.823111] device bridge_slave_0 left promiscuous mode [ 309.828670] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.851893] team0 (unregistering): Port device team_slave_1 removed [ 309.860736] team0 (unregistering): Port device team_slave_0 removed [ 309.870119] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 309.885603] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 309.906149] bond0 (unregistering): Released all slaves [ 310.379720] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.386151] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.399939] device bridge_slave_0 entered promiscuous mode [ 310.427401] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.433852] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.441254] device bridge_slave_1 entered promiscuous mode [ 310.467596] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 310.492584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:49:37 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d8a01f18bed2cc9bddf173ce3d1e9e0c78c086540dab55e466f6e227c4652f47712ed0566124cefd433563f042d21b56717f6569d9bdeff", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = dup2(r0, r0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x50, 0x0, 0x7}}, 0x14) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000000000b00000035b4ae90c7b7c4934529b4ae5b000000d4656d316e6f646576476d310000000000000000000000000000000000000000000100000000000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 11:49:37 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) [ 310.572735] bond0: Enslaving bond_slave_0 as an active interface with an up link 11:49:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff00000000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xfffffffffffffffe}}, 0x20) 11:49:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) [ 310.640725] bond0: Enslaving bond_slave_1 as an active interface with an up link 11:49:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) sync() r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = dup2(r0, r0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='system.posix_acl_access\x00', &(0x7f0000000280)='proc:/\x00', 0x7, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xc84) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f00000001c0)={0x10, 0x0, 0x2}, 0x10) 11:49:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x11b0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x0, 0x4}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) 11:49:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6783f32335a2290079", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 11:49:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000380)={0x18, 0x4, 0x4}, 0x18) 11:49:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open(&(0x7f0000000180)='./file0/file0\x00', 0x200, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$TIOCSTI(r1, 0x5412, 0x4) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000040)) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 11:49:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES16=r0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x102240, 0x1, 0x0, 0x2}}, 0xfffffffffffffc95) read$FUSE(r0, &(0x7f0000001000), 0x8d) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 310.918982] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 310.926888] team0: Port device team_slave_0 added 11:49:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 310.965571] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 310.975005] team0: Port device team_slave_1 added [ 311.004998] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 311.011908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 311.020711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 311.045891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 311.052740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 311.064276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 311.084264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 311.091481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.100343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.118799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 311.125907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.134753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.357932] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.364341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.370975] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.377357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.384826] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 11:49:38 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', '+proc\x00'}, &(0x7f0000000280)="2b73797374656dcc6370757365746367726f7570246367726f757015", 0x1c, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) sendmsg(r1, &(0x7f0000000340)={&(0x7f0000000180)=@ax25={0x3, {"9a2227f7fe1f3f"}, 0x8000800}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000005c0)="588395f9a8cf0ee97c6629a79e35ab44ca008ec421f243e55eefed016f6b37265612b13e10f152fc1b5fdd7e2a9d92f322d315c9f2bbf305bc80dcc09447e7bfba7f26e73e6273ffb7979445f7de7ce189ca6a1c41e6a0a854e1368a8e621803028c2babb55d296d621ae6a80a77cfdf08e29264e5d6cd52a9a3b1f32d561476a7ab99ef7c66adb9717627195067c70b0a2dcbee9dfdfb39a05d2002e87076661b568a2d45a9abcb62a6be83e028d872cb42fffe8ded2af26ab1b635c72e0159b4b644f190668a75b5aaf4dc09ae3fbcbbb0285b", 0xd4}], 0x1}, 0x40) eventfd2(0x45, 0x80001)