={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x440800, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) 19:14:50 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x13}}, 0x10) 19:14:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa02, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:50 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000040)={{0x0, 0x0, 0x2000000002, 0xf34, 0x7, 0x3, 0x9, 0xc0b, 0x7, 0x5, 0x10001, 0xffffffffffffff80, 0xffffffffffffffff, 0xd291, 0x9}, 0x8, [0x0]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) read$FUSE(r4, &(0x7f0000004180)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000040)={{0x0, 0x0, 0x2000000002, 0xf34, 0x7, 0x3, 0x9, 0xc0b, 0x7, 0x5, 0x10001, 0xffffffffffffff80, 0xffffffffffffffff, 0xd291, 0x9}, 0x8, [0x0]}) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) read$FUSE(r4, &(0x7f0000004180)={0x2020}, 0x2020) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:14:50 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) write$smackfs_ipv6host(r1, 0x0, 0xfffffffffffffda1) 19:14:50 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x13}}, 0x10) 19:14:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x2, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x92}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x111, 0x5}}, 0x20) 19:14:50 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) write$smackfs_ipv6host(r1, 0x0, 0xfffffffffffffda1) 19:14:50 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x13}}, 0x10) 19:14:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x2000000, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:50 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x92}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x111, 0x5}}, 0x20) 19:14:50 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x400, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x6}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[r1, r0]}, 0x2) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:50 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x200000000000000, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:50 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$tcp_mem(r0, &(0x7f0000000180)={0x5, 0x20, 0x1f4, 0x20, 0xfffffffffffffffa}, 0x48) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x442000, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e24, 0x400, @mcast1, 0xe2}}}, 0x38) 19:14:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x92}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x2, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x111, 0x5}}, 0x20) 19:14:50 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) write$smackfs_ipv6host(r1, 0x0, 0xfffffffffffffda1) 19:14:50 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:50 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x400, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x6}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async, rerun: 32) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[r1, r0]}, 0x2) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) 19:14:50 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$tcp_mem(r0, &(0x7f0000000180)={0x5, 0x20, 0x1f4, 0x20, 0xfffffffffffffffa}, 0x48) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x442000, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e24, 0x400, @mcast1, 0xe2}}}, 0x38) 19:14:50 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:50 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = syz_io_uring_setup(0x6723, &(0x7f0000000000)={0x0, 0x6531, 0x2, 0x2, 0x272}, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:50 executing program 2: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) write$tcp_mem(r0, &(0x7f0000000180)={0x5, 0x20, 0x1f4, 0x20, 0xfffffffffffffffa}, 0x48) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x442000, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e24, 0x400, @mcast1, 0xe2}}}, 0x38) (rerun: 64) 19:14:50 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x2, 0x0, @private2}, r1}}, 0x38) 19:14:50 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) syz_io_uring_setup(0x6723, &(0x7f0000000000)={0x0, 0x6531, 0x2, 0x2, 0x272}, &(0x7f0000000080), &(0x7f00000000c0)) (async) r2 = syz_io_uring_setup(0x6723, &(0x7f0000000000)={0x0, 0x6531, 0x2, 0x2, 0x272}, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) (async) 19:14:50 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x400, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x6}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[r1, r0]}, 0x2) (async, rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (rerun: 64) 19:14:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0x5}}, 0x20) 19:14:50 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x4240) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = syz_io_uring_setup(0x6723, &(0x7f0000000000)={0x0, 0x6531, 0x2, 0x2, 0x272}, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async, rerun: 32) write$smackfs_ipv6host(r0, 0x0, 0xb9) (rerun: 32) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e23, 0x9, @mcast2, 0x1}}}, 0x38) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x2, @private2}, r1}}, 0x38) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x4240) (async, rerun: 32) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (rerun: 32) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e23, 0x9, @mcast2, 0x1}}}, 0x38) (rerun: 32) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) (async) 19:14:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x2000000, @private2}, r1}}, 0x38) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x4240) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e23, 0x9, @mcast2, 0x1}}}, 0x38) 19:14:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0xff6a, 0xfa00, {{0x0, 0x0, "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", 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x9, 0x1017, "926f39b94ab0383ef46436da59311867b60901640672729515eaeaf5aed9973a62e8579c2a15306bcaeeed099c5db55183d91aa29434cbbc498396c3760a4367995b4af9998ebbadbab20a5ea2367d72a583360f1b3132fa1f45679eedc57366bea6d6213bbb9699ad172f678f340e18ffd1f35e9892451fb8da6fbf1e9621bd1ff867e038b54d4e1594e6a0e88befc007cceb642d941d0c9c422ba02b6f79d74136fc306d1e7a2b9f56b9426dca463732652b14bd937a7a0470b48d2a0a78f5bc3a9aad22bdde92c06c07f2f9f292973d66c82e97a36cec052a5a3fc9f80cc18c9f94c06793be7185a7e9f3a28dfc3d2800e91a643a8bde929b180efacef718", 0x7f, 0x0, 0x5b, 0x5a, 0x40, 0x0, 0x7f, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa0001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140), 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2f2082) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x113c00, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000080)={0x9, 0x0, &(0x7f0000000040)=[r3]}, 0x1) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="01edffff000002520b000000", @ANYRES32=r0, @ANYBLOB="0100ff00000000002e2f66696c653000"]) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$smackfs_ipv6host(r3, 0x0, 0x91) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa0001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140), 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2f2082) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x113c00, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000080)={0x9, 0x0, &(0x7f0000000040)=[r3]}, 0x1) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x2}}, r1}}, 0x38) 19:14:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0xff6a, 0xfa00, {{0x0, 0x0, "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", 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x9, 0x1017, "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", 0x7f, 0x0, 0x5b, 0x5a, 0x40, 0x0, 0x7f, 0x1}, r2}}, 0x120) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="01edffff000002520b000000", @ANYRES32=r0, @ANYBLOB="0100ff00000000002e2f66696c653000"]) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$smackfs_ipv6host(r3, 0x0, 0x91) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) (async) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa0001) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140), 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2f2082) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x113c00, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000080)={0x9, 0x0, &(0x7f0000000040)=[r3]}, 0x1) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa0001) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2f2082) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x113c00, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000080)={0x9, 0x0, &(0x7f0000000040)=[r3]}, 0x1) (async) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0xff6a, 0xfa00, {{0x0, 0x0, "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", 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x9, 0x1017, "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", 0x7f, 0x0, 0x5b, 0x5a, 0x40, 0x0, 0x7f, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="01edffff000002520b000000", @ANYRES32=r0, @ANYBLOB="0100ff00000000002e2f66696c653000"]) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$smackfs_ipv6host(r3, 0x0, 0x91) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2, 0x2}, r1}}, 0x38) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000), 0xf) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x39, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x8, 0xaf, @local, 0x2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2211000003000000100000000000000000002c00aaf58071a50a23a9e4e5ce4e20a7087dcfb93cc63f94ab6f2064dacbfd9543a6ae5c3794d8f41fd6b7bec44ab453ce9954d29c703eef2af468d2cafede536d8b2feb44bdad4ffcc7fc8bff7f39f7fb0eca52b9871bf806"], 0x22) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x59fb41) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:51 executing program 2: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x441200, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'unlock', ' ', 'io'}, 0xa) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2, 0x2000000}, r1}}, 0x38) 19:14:51 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000), 0xf) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000), 0xf) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) 19:14:51 executing program 2: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x441200, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'unlock', ' ', 'io'}, 0xa) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:51 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x59fb41) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9aca00}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:51 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x39, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x8, 0xaf, @local, 0x2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2211000003000000100000000000000000002c00aaf58071a50a23a9e4e5ce4e20a7087dcfb93cc63f94ab6f2064dacbfd9543a6ae5c3794d8f41fd6b7bec44ab453ce9954d29c703eef2af468d2cafede536d8b2feb44bdad4ffcc7fc8bff7f39f7fb0eca52b9871bf806"], 0x22) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x39, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x8, 0xaf, @local, 0x2}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2211000003000000100000000000000000002c00aaf58071a50a23a9e4e5ce4e20a7087dcfb93cc63f94ab6f2064dacbfd9543a6ae5c3794d8f41fd6b7bec44ab453ce9954d29c703eef2af468d2cafede536d8b2feb44bdad4ffcc7fc8bff7f39f7fb0eca52b9871bf806"], 0x22) (async) 19:14:51 executing program 2: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x441200, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x441200, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'unlock', ' ', 'io'}, 0xa) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:51 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b00000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000), 0xf) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000), 0xf) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) 19:14:52 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x59fb41) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/card3/oss_mixer\x00', 0x840, 0x0) fstat(r1, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r2, 0x10, 0x1, @in6={0xa, 0x4e22, 0x7fffffff, @rand_addr=' \x01\x00', 0x8c6}}}, 0xa0) 19:14:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x39, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x8, 0xaf, @local, 0x2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2211000003000000100000000000000000002c00aaf58071a50a23a9e4e5ce4e20a7087dcfb93cc63f94ab6f2064dacbfd9543a6ae5c3794d8f41fd6b7bec44ab453ce9954d29c703eef2af468d2cafede536d8b2feb44bdad4ffcc7fc8bff7f39f7fb0eca52b9871bf806"], 0x22) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x39, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x8, 0xaf, @local, 0x2}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2211000003000000100000000000000000002c00aaf58071a50a23a9e4e5ce4e20a7087dcfb93cc63f94ab6f2064dacbfd9543a6ae5c3794d8f41fd6b7bec44ab453ce9954d29c703eef2af468d2cafede536d8b2feb44bdad4ffcc7fc8bff7f39f7fb0eca52b9871bf806"], 0x22) (async) 19:14:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:52 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xac}}, './file0\x00'}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/card3/oss_mixer\x00', 0x840, 0x0) fstat(r1, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r2, 0x10, 0x1, @in6={0xa, 0x4e22, 0x7fffffff, @rand_addr=' \x01\x00', 0x8c6}}}, 0xa0) 19:14:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2c}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x1, "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", 0x8, 0x4, 0x0, 0x81, 0x7, 0x3f, 0x2, 0x1}, r3}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10000}}, './file0\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x38) 19:14:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/card3/oss_mixer\x00', 0x840, 0x0) fstat(r1, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r2, 0x10, 0x1, @in6={0xa, 0x4e22, 0x7fffffff, @rand_addr=' \x01\x00', 0x8c6}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000240)='/proc/asound/card3/oss_mixer\x00', 0x840, 0x0) (async) fstat(r1, &(0x7f0000000280)) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x2, 0xa}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r2, 0x10, 0x1, @in6={0xa, 0x4e22, 0x7fffffff, @rand_addr=' \x01\x00', 0x8c6}}}, 0xa0) (async) 19:14:52 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xac}}, './file0\x00'}) (async, rerun: 32) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (rerun: 32) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) 19:14:52 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) 19:14:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x38) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2c}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x1, "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", 0x8, 0x4, 0x0, 0x81, 0x7, 0x3f, 0x2, 0x1}, r3}}, 0x120) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10000}}, './file0\x00'}) (async, rerun: 32) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) 19:14:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0xfffffffffffffea3, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) 19:14:52 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) 19:14:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2c}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x1, "fbd15584d5f42b3824acbb3059430ff83a9fa9a3a6cb8c2e0746ec3e6ca425b020b249f6f4aa11897946b0d2c906d7bdf1fe920f87ef9c0a8eac8ef248809dd8382b1d90463011410d9670c71f4e199442d5484d626e2f32a07650dc274ed2faa316755fb0efcf731665a16c3cbb4892c4ea8d8397116c63282f108739e0f938037f174eda622b5906a3db0bb774f147e2ebb6e7c485fd7fddc5c5922d2a81cafb8a9d223ba27955d4bcc3a02574b5065770e9558798b3abbebc8151b61613249589de774b7013d58c7889b1a24e20f9d776477951bc463a5cec46210aa91789abd82f2b07aac27c8ee1e55e56668b7b5bfa03729ed0ecf44512ebd0a0332786", 0x8, 0x4, 0x0, 0x81, 0x7, 0x3f, 0x2, 0x1}, r3}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10000}}, './file0\x00'}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2c}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x1, "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", 0x8, 0x4, 0x0, 0x81, 0x7, 0x3f, 0x2, 0x1}, r3}}, 0x120) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10000}}, './file0\x00'}) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) (async) 19:14:52 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xac}}, './file0\x00'}) (async) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) 19:14:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0xfffffffffffffea3, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) 19:14:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}}, r1}}, 0x38) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 4: read$proc_mixer(0xffffffffffffffff, &(0x7f0000000040)=""/108, 0x6c) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x182) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000100)={"86d70c2fd8786dd5dddd63c4398cb442", 0x0, r2, {0xced9, 0x6}, {0x7fc000000, 0x1}, 0x8, [0x7, 0x8000, 0x6, 0x9, 0xdd1, 0x0, 0x7fffffff, 0x5, 0x8, 0x5, 0x5ab6, 0x81bb, 0x9792, 0x8, 0xff, 0x3e32573f]}) 19:14:52 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x1101c1) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000003140)={0xa0, 0xffffffffffffffda, 0x0, {{0x3, 0x0, 0x1, 0x8, 0xffffffff, 0x8, {0x5, 0x1000000000000, 0x5, 0x90, 0x800, 0x8, 0x2, 0x91, 0x101, 0xa000, 0x0, 0x0, 0xffffffffffffffff, 0x81, 0x80000000}}, {0x0, 0x8}}}, 0xa0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000100)={{0x0, 0xffffffffffffffff, 0x3, 0xc7, 0xffffffffffffb21b, 0x5, 0x3f, 0x6, 0xcb, 0x1f, 0x400, 0x5, 0x5, 0x8, 0x20}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000003200)={0x20, 0xfffffffffffffffc, r1, {0x0, 0x11}}, 0x20) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r4, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002380), 0x100000, 0x0) io_uring_register$IORING_REGISTER_RING_FDS(r7, 0x14, &(0x7f00000054c0)=[{0x1, 0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000021c0)=""/13, 0xd}], &(0x7f0000002240)=[0x0, 0x6]}, {0x6, 0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002280)=""/94, 0x5e}, {&(0x7f0000002300)=""/53, 0x35}, {&(0x7f0000002340)=""/1, 0x1}, {&(0x7f0000002380)}, {&(0x7f00000023c0)=""/149, 0x95}, {&(0x7f0000002480)=""/125, 0x7d}], &(0x7f0000002580)=[0x0, 0x4, 0x0, 0x7ff, 0x9, 0x8, 0x5, 0x1, 0xc7d, 0xffffffffffffe429]}, {0x2, 0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002600)=""/64, 0x40}, {&(0x7f0000002640)=""/44, 0x2c}], &(0x7f00000026c0)=[0x401, 0x6, 0x3d7]}, {0x1, 0x1, 0x0, &(0x7f0000002800)=[{&(0x7f0000002700)=""/228, 0xe4}], &(0x7f0000002840)=[0x0, 0x5, 0x3]}, {0x2, 0x1, 0x0, &(0x7f0000002980)=[{&(0x7f0000002880)=""/103, 0x67}, {&(0x7f0000002900)=""/69, 0x45}], &(0x7f00000029c0)=[0x438, 0x8, 0x4, 0x7]}, {0x5, 0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)}, {&(0x7f0000003a40)=""/22, 0x16}, {&(0x7f0000003a80)=""/112, 0x70}, {&(0x7f0000003b00)=""/226, 0xe2}], &(0x7f0000003c80)=[0x101, 0xfffffffffffffffc, 0x3167, 0x8001]}, {0x4, 0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000003cc0)=""/131, 0x83}, {&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/93, 0x5d}, {&(0x7f0000004e00)=""/105, 0x69}], &(0x7f0000004ec0)=[0x800, 0xf8f, 0xffffffff, 0x1000]}, {0x1, 0x1, 0x0, &(0x7f0000004f80)=[{&(0x7f0000004f00)=""/96, 0x60}], &(0x7f0000004fc0)=[0xb89, 0x10000, 0x7f, 0x80000001]}, {0x2, 0x1, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005000)=""/178, 0xb2}, {&(0x7f00000050c0)=""/249, 0xf9}], &(0x7f0000005200)=[0x9]}, {0x2, 0x1, 0x0, &(0x7f0000005440)=[{&(0x7f0000005240)=""/224, 0xe0}, {&(0x7f0000005340)=""/203, 0xcb}], &(0x7f0000005480)=[0x3, 0x28, 0x8000000000000001, 0x6c]}], 0xa) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f00000002c0)={0x78, 0x0, r5, {0x7ff, 0x40000, 0x0, {0x0, 0x1, 0x5db4, 0x7, 0x97f, 0x1000, 0x8, 0x2, 0x5, 0x6000, 0x7, r6, r8, 0x2, 0x8f60}}}, 0x78) 19:14:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0xfffffffffffffea3, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) 19:14:52 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x1101c1) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000003140)={0xa0, 0xffffffffffffffda, 0x0, {{0x3, 0x0, 0x1, 0x8, 0xffffffff, 0x8, {0x5, 0x1000000000000, 0x5, 0x90, 0x800, 0x8, 0x2, 0x91, 0x101, 0xa000, 0x0, 0x0, 0xffffffffffffffff, 0x81, 0x80000000}}, {0x0, 0x8}}}, 0xa0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000100)={{0x0, 0xffffffffffffffff, 0x3, 0xc7, 0xffffffffffffb21b, 0x5, 0x3f, 0x6, 0xcb, 0x1f, 0x400, 0x5, 0x5, 0x8, 0x20}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000100)={{0x0, 0xffffffffffffffff, 0x3, 0xc7, 0xffffffffffffb21b, 0x5, 0x3f, 0x6, 0xcb, 0x1f, 0x400, 0x5, 0x5, 0x8, 0x20}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000003200)={0x20, 0xfffffffffffffffc, r1, {0x0, 0x11}}, 0x20) 19:14:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x3) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) read$proc_mixer(r2, &(0x7f0000000140)=""/189, 0xbd) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x3, @private0, 0x8001}, r1}}, 0x38) openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000002c0), 0x80402, 0x198) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x9, @ipv4={'\x00', '\xff\xff', @empty}, 0xffffffff}, r1}}, 0x38) 19:14:52 executing program 4: read$proc_mixer(0xffffffffffffffff, &(0x7f0000000040)=""/108, 0x6c) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x182) (async, rerun: 32) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async, rerun: 32) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000100)={"86d70c2fd8786dd5dddd63c4398cb442", 0x0, r2, {0xced9, 0x6}, {0x7fc000000, 0x1}, 0x8, [0x7, 0x8000, 0x6, 0x9, 0xdd1, 0x0, 0x7fffffff, 0x5, 0x8, 0x5, 0x5ab6, 0x81bb, 0x9792, 0x8, 0xff, 0x3e32573f]}) 19:14:52 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) mknodat$loop(r1, &(0x7f00000003c0)='./file0\x00', 0x100, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xe, &(0x7f0000000380)={0x2, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/139, 0x8b}, {&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/117, 0x75}, {&(0x7f00000002c0)=""/127, 0x7f}], &(0x7f0000000340)=[0x5], 0x4}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:52 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r4, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002380), 0x100000, 0x0) io_uring_register$IORING_REGISTER_RING_FDS(r7, 0x14, &(0x7f00000054c0)=[{0x1, 0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000021c0)=""/13, 0xd}], &(0x7f0000002240)=[0x0, 0x6]}, {0x6, 0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002280)=""/94, 0x5e}, {&(0x7f0000002300)=""/53, 0x35}, {&(0x7f0000002340)=""/1, 0x1}, {&(0x7f0000002380)}, {&(0x7f00000023c0)=""/149, 0x95}, {&(0x7f0000002480)=""/125, 0x7d}], &(0x7f0000002580)=[0x0, 0x4, 0x0, 0x7ff, 0x9, 0x8, 0x5, 0x1, 0xc7d, 0xffffffffffffe429]}, {0x2, 0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002600)=""/64, 0x40}, {&(0x7f0000002640)=""/44, 0x2c}], &(0x7f00000026c0)=[0x401, 0x6, 0x3d7]}, {0x1, 0x1, 0x0, &(0x7f0000002800)=[{&(0x7f0000002700)=""/228, 0xe4}], &(0x7f0000002840)=[0x0, 0x5, 0x3]}, {0x2, 0x1, 0x0, &(0x7f0000002980)=[{&(0x7f0000002880)=""/103, 0x67}, {&(0x7f0000002900)=""/69, 0x45}], &(0x7f00000029c0)=[0x438, 0x8, 0x4, 0x7]}, {0x5, 0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)}, {&(0x7f0000003a40)=""/22, 0x16}, {&(0x7f0000003a80)=""/112, 0x70}, {&(0x7f0000003b00)=""/226, 0xe2}], &(0x7f0000003c80)=[0x101, 0xfffffffffffffffc, 0x3167, 0x8001]}, {0x4, 0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000003cc0)=""/131, 0x83}, {&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/93, 0x5d}, {&(0x7f0000004e00)=""/105, 0x69}], &(0x7f0000004ec0)=[0x800, 0xf8f, 0xffffffff, 0x1000]}, {0x1, 0x1, 0x0, &(0x7f0000004f80)=[{&(0x7f0000004f00)=""/96, 0x60}], &(0x7f0000004fc0)=[0xb89, 0x10000, 0x7f, 0x80000001]}, {0x2, 0x1, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005000)=""/178, 0xb2}, {&(0x7f00000050c0)=""/249, 0xf9}], &(0x7f0000005200)=[0x9]}, {0x2, 0x1, 0x0, &(0x7f0000005440)=[{&(0x7f0000005240)=""/224, 0xe0}, {&(0x7f0000005340)=""/203, 0xcb}], &(0x7f0000005480)=[0x3, 0x28, 0x8000000000000001, 0x6c]}], 0xa) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f00000002c0)={0x78, 0x0, r5, {0x7ff, 0x40000, 0x0, {0x0, 0x1, 0x5db4, 0x7, 0x97f, 0x1000, 0x8, 0x2, 0x5, 0x6000, 0x7, r6, r8, 0x2, 0x8f60}}}, 0x78) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000002180)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(r4, &(0x7f00000000c0)={0x2020}, 0x2020) (async) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5}, 0x50) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002380), 0x100000, 0x0) (async) io_uring_register$IORING_REGISTER_RING_FDS(r7, 0x14, &(0x7f00000054c0)=[{0x1, 0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000021c0)=""/13, 0xd}], &(0x7f0000002240)=[0x0, 0x6]}, {0x6, 0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002280)=""/94, 0x5e}, {&(0x7f0000002300)=""/53, 0x35}, {&(0x7f0000002340)=""/1, 0x1}, {&(0x7f0000002380)}, {&(0x7f00000023c0)=""/149, 0x95}, {&(0x7f0000002480)=""/125, 0x7d}], &(0x7f0000002580)=[0x0, 0x4, 0x0, 0x7ff, 0x9, 0x8, 0x5, 0x1, 0xc7d, 0xffffffffffffe429]}, {0x2, 0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002600)=""/64, 0x40}, {&(0x7f0000002640)=""/44, 0x2c}], &(0x7f00000026c0)=[0x401, 0x6, 0x3d7]}, {0x1, 0x1, 0x0, &(0x7f0000002800)=[{&(0x7f0000002700)=""/228, 0xe4}], &(0x7f0000002840)=[0x0, 0x5, 0x3]}, {0x2, 0x1, 0x0, &(0x7f0000002980)=[{&(0x7f0000002880)=""/103, 0x67}, {&(0x7f0000002900)=""/69, 0x45}], &(0x7f00000029c0)=[0x438, 0x8, 0x4, 0x7]}, {0x5, 0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)}, {&(0x7f0000003a40)=""/22, 0x16}, {&(0x7f0000003a80)=""/112, 0x70}, {&(0x7f0000003b00)=""/226, 0xe2}], &(0x7f0000003c80)=[0x101, 0xfffffffffffffffc, 0x3167, 0x8001]}, {0x4, 0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000003cc0)=""/131, 0x83}, {&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/93, 0x5d}, {&(0x7f0000004e00)=""/105, 0x69}], &(0x7f0000004ec0)=[0x800, 0xf8f, 0xffffffff, 0x1000]}, {0x1, 0x1, 0x0, &(0x7f0000004f80)=[{&(0x7f0000004f00)=""/96, 0x60}], &(0x7f0000004fc0)=[0xb89, 0x10000, 0x7f, 0x80000001]}, {0x2, 0x1, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005000)=""/178, 0xb2}, {&(0x7f00000050c0)=""/249, 0xf9}], &(0x7f0000005200)=[0x9]}, {0x2, 0x1, 0x0, &(0x7f0000005440)=[{&(0x7f0000005240)=""/224, 0xe0}, {&(0x7f0000005340)=""/203, 0xcb}], &(0x7f0000005480)=[0x3, 0x28, 0x8000000000000001, 0x6c]}], 0xa) (async) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) (async) write$FUSE_ATTR(r2, &(0x7f00000002c0)={0x78, 0x0, r5, {0x7ff, 0x40000, 0x0, {0x0, 0x1, 0x5db4, 0x7, 0x97f, 0x1000, 0x8, 0x2, 0x5, 0x6000, 0x7, r6, r8, 0x2, 0x8f60}}}, 0x78) (async) 19:14:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x3) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) read$proc_mixer(r2, &(0x7f0000000140)=""/189, 0xbd) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x3, @private0, 0x8001}, r1}}, 0x38) (async) openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000002c0), 0x80402, 0x198) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x9, @ipv4={'\x00', '\xff\xff', @empty}, 0xffffffff}, r1}}, 0x38) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x1101c1) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000003140)={0xa0, 0xffffffffffffffda, 0x0, {{0x3, 0x0, 0x1, 0x8, 0xffffffff, 0x8, {0x5, 0x1000000000000, 0x5, 0x90, 0x800, 0x8, 0x2, 0x91, 0x101, 0xa000, 0x0, 0x0, 0xffffffffffffffff, 0x81, 0x80000000}}, {0x0, 0x8}}}, 0xa0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000100)={{0x0, 0xffffffffffffffff, 0x3, 0xc7, 0xffffffffffffb21b, 0x5, 0x3f, 0x6, 0xcb, 0x1f, 0x400, 0x5, 0x5, 0x8, 0x20}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000001100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000003200)={0x20, 0xfffffffffffffffc, r1, {0x0, 0x11}}, 0x20) 19:14:52 executing program 4: read$proc_mixer(0xffffffffffffffff, &(0x7f0000000040)=""/108, 0x6c) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x182) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000100)={"86d70c2fd8786dd5dddd63c4398cb442", 0x0, r2, {0xced9, 0x6}, {0x7fc000000, 0x1}, 0x8, [0x7, 0x8000, 0x6, 0x9, 0xdd1, 0x0, 0x7fffffff, 0x5, 0x8, 0x5, 0x5ab6, 0x81bb, 0x9792, 0x8, 0xff, 0x3e32573f]}) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000040)=""/108, 0x6c) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x182) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f00000000c0)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000100)={"86d70c2fd8786dd5dddd63c4398cb442", 0x0, r2, {0xced9, 0x6}, {0x7fc000000, 0x1}, 0x8, [0x7, 0x8000, 0x6, 0x9, 0xdd1, 0x0, 0x7fffffff, 0x5, 0x8, 0x5, 0x5ab6, 0x81bb, 0x9792, 0x8, 0xff, 0x3e32573f]}) (async) 19:14:52 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) mknodat$loop(r1, &(0x7f00000003c0)='./file0\x00', 0x100, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xe, &(0x7f0000000380)={0x2, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/139, 0x8b}, {&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/117, 0x75}, {&(0x7f00000002c0)=""/127, 0x7f}], &(0x7f0000000340)=[0x5], 0x4}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) mknodat$loop(r1, &(0x7f00000003c0)='./file0\x00', 0x100, 0x1) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xe, &(0x7f0000000380)={0x2, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/139, 0x8b}, {&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/117, 0x75}, {&(0x7f00000002c0)=""/127, 0x7f}], &(0x7f0000000340)=[0x5], 0x4}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) 19:14:52 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x3) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) read$proc_mixer(r2, &(0x7f0000000140)=""/189, 0xbd) (async) read$proc_mixer(r2, &(0x7f0000000140)=""/189, 0xbd) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x3, @private0, 0x8001}, r1}}, 0x38) openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000002c0), 0x80402, 0x198) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240), r3}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x9, @ipv4={'\x00', '\xff\xff', @empty}, 0xffffffff}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x9, @ipv4={'\x00', '\xff\xff', @empty}, 0xffffffff}, r1}}, 0x38) 19:14:52 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) 19:14:52 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000002180)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r4, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002380), 0x100000, 0x0) io_uring_register$IORING_REGISTER_RING_FDS(r7, 0x14, &(0x7f00000054c0)=[{0x1, 0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000021c0)=""/13, 0xd}], &(0x7f0000002240)=[0x0, 0x6]}, {0x6, 0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002280)=""/94, 0x5e}, {&(0x7f0000002300)=""/53, 0x35}, {&(0x7f0000002340)=""/1, 0x1}, {&(0x7f0000002380)}, {&(0x7f00000023c0)=""/149, 0x95}, {&(0x7f0000002480)=""/125, 0x7d}], &(0x7f0000002580)=[0x0, 0x4, 0x0, 0x7ff, 0x9, 0x8, 0x5, 0x1, 0xc7d, 0xffffffffffffe429]}, {0x2, 0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002600)=""/64, 0x40}, {&(0x7f0000002640)=""/44, 0x2c}], &(0x7f00000026c0)=[0x401, 0x6, 0x3d7]}, {0x1, 0x1, 0x0, &(0x7f0000002800)=[{&(0x7f0000002700)=""/228, 0xe4}], &(0x7f0000002840)=[0x0, 0x5, 0x3]}, {0x2, 0x1, 0x0, &(0x7f0000002980)=[{&(0x7f0000002880)=""/103, 0x67}, {&(0x7f0000002900)=""/69, 0x45}], &(0x7f00000029c0)=[0x438, 0x8, 0x4, 0x7]}, {0x5, 0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)}, {&(0x7f0000003a40)=""/22, 0x16}, {&(0x7f0000003a80)=""/112, 0x70}, {&(0x7f0000003b00)=""/226, 0xe2}], &(0x7f0000003c80)=[0x101, 0xfffffffffffffffc, 0x3167, 0x8001]}, {0x4, 0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000003cc0)=""/131, 0x83}, {&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/93, 0x5d}, {&(0x7f0000004e00)=""/105, 0x69}], &(0x7f0000004ec0)=[0x800, 0xf8f, 0xffffffff, 0x1000]}, {0x1, 0x1, 0x0, &(0x7f0000004f80)=[{&(0x7f0000004f00)=""/96, 0x60}], &(0x7f0000004fc0)=[0xb89, 0x10000, 0x7f, 0x80000001]}, {0x2, 0x1, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005000)=""/178, 0xb2}, {&(0x7f00000050c0)=""/249, 0xf9}], &(0x7f0000005200)=[0x9]}, {0x2, 0x1, 0x0, &(0x7f0000005440)=[{&(0x7f0000005240)=""/224, 0xe0}, {&(0x7f0000005340)=""/203, 0xcb}], &(0x7f0000005480)=[0x3, 0x28, 0x8000000000000001, 0x6c]}], 0xa) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f00000002c0)={0x78, 0x0, r5, {0x7ff, 0x40000, 0x0, {0x0, 0x1, 0x5db4, 0x7, 0x97f, 0x1000, 0x8, 0x2, 0x5, 0x6000, 0x7, r6, r8, 0x2, 0x8f60}}}, 0x78) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000002180)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x2000, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(r4, &(0x7f00000000c0)={0x2020}, 0x2020) (async) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5}, 0x50) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002380), 0x100000, 0x0) (async) io_uring_register$IORING_REGISTER_RING_FDS(r7, 0x14, &(0x7f00000054c0)=[{0x1, 0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000021c0)=""/13, 0xd}], &(0x7f0000002240)=[0x0, 0x6]}, {0x6, 0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002280)=""/94, 0x5e}, {&(0x7f0000002300)=""/53, 0x35}, {&(0x7f0000002340)=""/1, 0x1}, {&(0x7f0000002380)}, {&(0x7f00000023c0)=""/149, 0x95}, {&(0x7f0000002480)=""/125, 0x7d}], &(0x7f0000002580)=[0x0, 0x4, 0x0, 0x7ff, 0x9, 0x8, 0x5, 0x1, 0xc7d, 0xffffffffffffe429]}, {0x2, 0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002600)=""/64, 0x40}, {&(0x7f0000002640)=""/44, 0x2c}], &(0x7f00000026c0)=[0x401, 0x6, 0x3d7]}, {0x1, 0x1, 0x0, &(0x7f0000002800)=[{&(0x7f0000002700)=""/228, 0xe4}], &(0x7f0000002840)=[0x0, 0x5, 0x3]}, {0x2, 0x1, 0x0, &(0x7f0000002980)=[{&(0x7f0000002880)=""/103, 0x67}, {&(0x7f0000002900)=""/69, 0x45}], &(0x7f00000029c0)=[0x438, 0x8, 0x4, 0x7]}, {0x5, 0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)}, {&(0x7f0000003a40)=""/22, 0x16}, {&(0x7f0000003a80)=""/112, 0x70}, {&(0x7f0000003b00)=""/226, 0xe2}], &(0x7f0000003c80)=[0x101, 0xfffffffffffffffc, 0x3167, 0x8001]}, {0x4, 0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000003cc0)=""/131, 0x83}, {&(0x7f0000003d80)=""/4096, 0x1000}, {&(0x7f0000004d80)=""/93, 0x5d}, {&(0x7f0000004e00)=""/105, 0x69}], &(0x7f0000004ec0)=[0x800, 0xf8f, 0xffffffff, 0x1000]}, {0x1, 0x1, 0x0, &(0x7f0000004f80)=[{&(0x7f0000004f00)=""/96, 0x60}], &(0x7f0000004fc0)=[0xb89, 0x10000, 0x7f, 0x80000001]}, {0x2, 0x1, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005000)=""/178, 0xb2}, {&(0x7f00000050c0)=""/249, 0xf9}], &(0x7f0000005200)=[0x9]}, {0x2, 0x1, 0x0, &(0x7f0000005440)=[{&(0x7f0000005240)=""/224, 0xe0}, {&(0x7f0000005340)=""/203, 0xcb}], &(0x7f0000005480)=[0x3, 0x28, 0x8000000000000001, 0x6c]}], 0xa) (async) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) (async) write$FUSE_ATTR(r2, &(0x7f00000002c0)={0x78, 0x0, r5, {0x7ff, 0x40000, 0x0, {0x0, 0x1, 0x5db4, 0x7, 0x97f, 0x1000, 0x8, 0x2, 0x5, 0x6000, 0x7, r6, r8, 0x2, 0x8f60}}}, 0x78) (async) 19:14:52 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) epoll_wait(r2, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x6) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000880)={0x6, 0x118, 0xfa00, {{0x6, 0x10000, "fde8d367ee5af6321297f030af6391134115bcf08542dabfcdc0a1d373b7498682952291a16e9fead196e7b4991e208781da02b3834588c0ca8dc79b2b0c5a7bcc9105b923c20e7df4c32ec5511fe25711d59304878823574b196891438c6ee016216cb425b0eea10573ccd43b769bc247625a58bdfa37e8625f90fe3c24e419e7890e283c15788aed71f250dd88ed9c8b4ef891f240be06652b1de398fdb36f5ad833b85495a5a96230b5997a44c95d5cb4fbb1b34d5c3b2b687ee8a7eda4adf45c9616928ff5f92dcaae9353651aea8c112ea3a84fe8c6a67cf82339d6d614a824e341c230813ee1b3ced8a9c1e5dd3405d5716036ec87c8133dd8bf902444", 0x2, 0x1, 0x8, 0x80, 0x3f, 0xf7, 0x9}, r3}}, 0x120) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) 19:14:52 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) mknodat$loop(r1, &(0x7f00000003c0)='./file0\x00', 0x100, 0x1) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xe, &(0x7f0000000380)={0x2, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/139, 0x8b}, {&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/117, 0x75}, {&(0x7f00000002c0)=""/127, 0x7f}], &(0x7f0000000340)=[0x5], 0x4}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:52 executing program 4: write$proc_mixer(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="4c696e65272030303016303030303030303030303030303030300a414c5450434d0a00"/49], 0x31) write$damon_schemes(0xffffffffffffffff, &(0x7f0000000000)={0x5, 0x6, 0x20, 0x20, 0x101, 0x100, 0xffff}, 0x66) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x200010, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0xe00}}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@permit_directio}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f0000000340)="56ab259f3ab0133cdfbe7315ef7dd250785310ae186f91f75d7bd4bf18a7b9cd62069ddcf1aa89b538a6ea486c260c1c489fc80f185063549f9d99c84c723a2fb9a9a5a9aae1bd5624d781966b01fd8b87e8") getdents64(r2, &(0x7f00000003c0)=""/62, 0x3e) write$smackfs_ipv6host(r0, 0x0, 0xb9) r3 = io_uring_setup(0x6c2e, &(0x7f00000000c0)={0x0, 0xee1f, 0x4, 0x2, 0x1a5}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x4010, r3, 0x8000000) 19:14:52 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) (rerun: 32) 19:14:53 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:53 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) [ 1487.690213][T13681] fuse: Bad value for 'fd' 19:14:53 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x220880) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, &(0x7f0000001140)={0x2, 0x1, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/67, 0x43}, {&(0x7f0000000100)=""/4096, 0x1000}], &(0x7f0000001100)=[0x20, 0x4, 0xe68, 0x8, 0x5, 0x7f]}, 0x20) 19:14:53 executing program 4: write$proc_mixer(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="4c696e65272030303016303030303030303030303030303030300a414c5450434d0a00"/49], 0x31) write$damon_schemes(0xffffffffffffffff, &(0x7f0000000000)={0x5, 0x6, 0x20, 0x20, 0x101, 0x100, 0xffff}, 0x66) (async, rerun: 32) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async, rerun: 32) statx(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x200010, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0xe00}}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@permit_directio}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f0000000340)="56ab259f3ab0133cdfbe7315ef7dd250785310ae186f91f75d7bd4bf18a7b9cd62069ddcf1aa89b538a6ea486c260c1c489fc80f185063549f9d99c84c723a2fb9a9a5a9aae1bd5624d781966b01fd8b87e8") getdents64(r2, &(0x7f00000003c0)=""/62, 0x3e) (async, rerun: 32) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async, rerun: 32) r3 = io_uring_setup(0x6c2e, &(0x7f00000000c0)={0x0, 0xee1f, 0x4, 0x2, 0x1a5}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x4010, r3, 0x8000000) 19:14:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r3, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000002100)={0x50, 0x0, r4}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0xfffffffffffffff5, r4, {0x3, 0x4, 0x0, {0x6, 0x0, 0x7, 0xd6, 0x81, 0x5, 0xffff, 0x800, 0x1, 0x1000, 0x9, r5, 0xee00, 0xc444, 0x7}}}, 0x78) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc, 0x7, "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", 0x7, 0xc8, 0x5, 0x8, 0x5, 0x1, 0x2, 0x1}}}, 0x120) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000080)={&(0x7f0000001000)={[{&(0x7f0000000040)="c9d099c79343ba1bf0b9fd999cb3adf926d3dd0f224b43", 0x17, 0x3}]}, 0x1, 0x1}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:53 executing program 2: newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r1 = syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xa, &(0x7f00000001c0)=ANY=[@ANYBLOB='Kd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',allow_other,max_read=0x0000000000000006,allow_other,uid=', @ANYRESDEC, @ANYBLOB=',smackfshat=,fsmagic=0x0000000000000053,rootcontext=staff_u,dont_appraise,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',appraise,appraise,\x00'], 0x1, 0x0, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) epoll_wait(r2, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x6) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000880)={0x6, 0x118, 0xfa00, {{0x6, 0x10000, "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", 0x2, 0x1, 0x8, 0x80, 0x3f, 0xf7, 0x9}, r3}}, 0x120) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) epoll_wait(r2, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x6) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000880)={0x6, 0x118, 0xfa00, {{0x6, 0x10000, "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", 0x2, 0x1, 0x8, 0x80, 0x3f, 0xf7, 0x9}, r3}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) 19:14:53 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:53 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x220880) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, &(0x7f0000001140)={0x2, 0x1, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/67, 0x43}, {&(0x7f0000000100)=""/4096, 0x1000}], &(0x7f0000001100)=[0x20, 0x4, 0xe68, 0x8, 0x5, 0x7f]}, 0x20) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x220880) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, &(0x7f0000001140)={0x2, 0x1, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/67, 0x43}, {&(0x7f0000000100)=""/4096, 0x1000}], &(0x7f0000001100)=[0x20, 0x4, 0xe68, 0x8, 0x5, 0x7f]}, 0x20) (async) 19:14:53 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r3, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000002100)={0x50, 0x0, r4}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0xfffffffffffffff5, r4, {0x3, 0x4, 0x0, {0x6, 0x0, 0x7, 0xd6, 0x81, 0x5, 0xffff, 0x800, 0x1, 0x1000, 0x9, r5, 0xee00, 0xc444, 0x7}}}, 0x78) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc, 0x7, "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", 0x7, 0xc8, 0x5, 0x8, 0x5, 0x1, 0x2, 0x1}}}, 0x120) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000080)={&(0x7f0000001000)={[{&(0x7f0000000040)="c9d099c79343ba1bf0b9fd999cb3adf926d3dd0f224b43", 0x17, 0x3}]}, 0x1, 0x1}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(r3, &(0x7f00000000c0)={0x2020}, 0x2020) (async) write$FUSE_INIT(r2, &(0x7f0000002100)={0x50, 0x0, r4}, 0x50) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0) (async) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0xfffffffffffffff5, r4, {0x3, 0x4, 0x0, {0x6, 0x0, 0x7, 0xd6, 0x81, 0x5, 0xffff, 0x800, 0x1, 0x1000, 0x9, r5, 0xee00, 0xc444, 0x7}}}, 0x78) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc, 0x7, "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", 0x7, 0xc8, 0x5, 0x8, 0x5, 0x1, 0x2, 0x1}}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000080)={&(0x7f0000001000)={[{&(0x7f0000000040)="c9d099c79343ba1bf0b9fd999cb3adf926d3dd0f224b43", 0x17, 0x3}]}, 0x1, 0x1}, 0x1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:14:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) epoll_wait(r2, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x6) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000880)={0x6, 0x118, 0xfa00, {{0x6, 0x10000, "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", 0x2, 0x1, 0x8, 0x80, 0x3f, 0xf7, 0x9}, r3}}, 0x120) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) epoll_wait(r2, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x6) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.1GB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000880)={0x6, 0x118, 0xfa00, {{0x6, 0x10000, "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", 0x2, 0x1, 0x8, 0x80, 0x3f, 0xf7, 0x9}, r3}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) 19:14:53 executing program 2: newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r1 = syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xa, &(0x7f00000001c0)=ANY=[@ANYBLOB='Kd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',allow_other,max_read=0x0000000000000006,allow_other,uid=', @ANYRESDEC, @ANYBLOB=',smackfshat=,fsmagic=0x0000000000000053,rootcontext=staff_u,dont_appraise,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',appraise,appraise,\x00'], 0x1, 0x0, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x800) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xa, &(0x7f00000001c0)=ANY=[@ANYBLOB='Kd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',allow_other,max_read=0x0000000000000006,allow_other,uid=', @ANYRESDEC, @ANYBLOB=',smackfshat=,fsmagic=0x0000000000000053,rootcontext=staff_u,dont_appraise,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',appraise,appraise,\x00'], 0x1, 0x0, &(0x7f0000000300)) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) 19:14:53 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) [ 1487.903261][T13704] fuse: Bad value for 'fd' 19:14:53 executing program 2: newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) r1 = syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xa, &(0x7f00000001c0)=ANY=[@ANYBLOB='Kd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',allow_other,max_read=0x0000000000000006,allow_other,uid=', @ANYRESDEC, @ANYBLOB=',smackfshat=,fsmagic=0x0000000000000053,rootcontext=staff_u,dont_appraise,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',appraise,appraise,\x00'], 0x1, 0x0, &(0x7f0000000300)) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x800) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xa, &(0x7f00000001c0)=ANY=[@ANYBLOB='Kd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',allow_other,max_read=0x0000000000000006,allow_other,uid=', @ANYRESDEC, @ANYBLOB=',smackfshat=,fsmagic=0x0000000000000053,rootcontext=staff_u,dont_appraise,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',appraise,appraise,\x00'], 0x1, 0x0, &(0x7f0000000300)) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) 19:14:53 executing program 4: write$proc_mixer(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="4c696e65272030303016303030303030303030303030303030300a414c5450434d0a00"/49], 0x31) (async) write$damon_schemes(0xffffffffffffffff, &(0x7f0000000000)={0x5, 0x6, 0x20, 0x20, 0x101, 0x100, 0xffff}, 0x66) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_mount_image$fuse(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x200010, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0xe00}}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@permit_directio}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f0000000340)="56ab259f3ab0133cdfbe7315ef7dd250785310ae186f91f75d7bd4bf18a7b9cd62069ddcf1aa89b538a6ea486c260c1c489fc80f185063549f9d99c84c723a2fb9a9a5a9aae1bd5624d781966b01fd8b87e8") getdents64(r2, &(0x7f00000003c0)=""/62, 0x3e) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async, rerun: 32) r3 = io_uring_setup(0x6c2e, &(0x7f00000000c0)={0x0, 0xee1f, 0x4, 0x2, 0x1a5}) (rerun: 32) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x4010, r3, 0x8000000) 19:14:53 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x2, 0x20, 0x7, 0x1f, 0x4, 0x2, 0x20, 0x1}}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="01000008000000002e2f66696c65300090ffb8a6edf750900d9e1459e9c1cee3a5a05d92c1c0dd6fb5b6d95a04af060b59dd572704f27ec9179f2a5218056bb60661eea4b108eaf060c8b1bb649514f4e7b3aebb2a2f04fd8bf64099a50eac1f7953b58f12d56835c4bba73ba2abcdea82a1d5b82dd34a5fd56ea23f6f0dd9734d028a0bb337c7a1"]) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) 19:14:53 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x220880) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, &(0x7f0000001140)={0x2, 0x1, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/67, 0x43}, {&(0x7f0000000100)=""/4096, 0x1000}], &(0x7f0000001100)=[0x20, 0x4, 0xe68, 0x8, 0x5, 0x7f]}, 0x20) 19:14:53 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:53 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000000)={0xf, 0x8}, 0x10) 19:14:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x2, 0x20, 0x7, 0x1f, 0x4, 0x2, 0x20, 0x1}}}, 0x120) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="01000008000000002e2f66696c65300090ffb8a6edf750900d9e1459e9c1cee3a5a05d92c1c0dd6fb5b6d95a04af060b59dd572704f27ec9179f2a5218056bb60661eea4b108eaf060c8b1bb649514f4e7b3aebb2a2f04fd8bf64099a50eac1f7953b58f12d56835c4bba73ba2abcdea82a1d5b82dd34a5fd56ea23f6f0dd9734d028a0bb337c7a1"]) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) [ 1488.063915][T13730] fuse: Bad value for 'fd' 19:14:54 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x400100) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r3, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000100)={{r3, 0x101, 0xfffffffffffffffd, 0x5b62, 0x1a3a, 0x9, 0x4, 0x3, 0x9, 0x6, 0x655, 0x1000, 0x80000001, 0x2, 0x80000001}}) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000000)={0xf, 0x8}, 0x10) 19:14:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x2, 0x20, 0x7, 0x1f, 0x4, 0x2, 0x20, 0x1}}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="01000008000000002e2f66696c65300090ffb8a6edf750900d9e1459e9c1cee3a5a05d92c1c0dd6fb5b6d95a04af060b59dd572704f27ec9179f2a5218056bb60661eea4b108eaf060c8b1bb649514f4e7b3aebb2a2f04fd8bf64099a50eac1f7953b58f12d56835c4bba73ba2abcdea82a1d5b82dd34a5fd56ea23f6f0dd9734d028a0bb337c7a1"]) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x2, 0x20, 0x7, 0x1f, 0x4, 0x2, 0x20, 0x1}}}, 0x120) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="01000008000000002e2f66696c65300090ffb8a6edf750900d9e1459e9c1cee3a5a05d92c1c0dd6fb5b6d95a04af060b59dd572704f27ec9179f2a5218056bb60661eea4b108eaf060c8b1bb649514f4e7b3aebb2a2f04fd8bf64099a50eac1f7953b58f12d56835c4bba73ba2abcdea82a1d5b82dd34a5fd56ea23f6f0dd9734d028a0bb337c7a1"]) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) (async) 19:14:54 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x984090, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d5ad3653d3030303030303030303030303030302c757365725f69643d", @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',blksize=0x0000000000000800,allow_other,fowner>', @ANYRESDEC, @ANYBLOB="2c646552636f41746578742855bce58f2a2eec2f3d73797361646d5f66ae8b00eecab7cd17521a308593ff8eebb96d4c61bbda10a4b8559923a4cd80e79052d58c01d847b370a64d00a2275b988c6067e5b3e4d16d85cec3580e1a3f65786784eb872bf5b1c47c3f9b21538972d7eee6cddd2a664aa0826fa135aba95c553f4fc26c3d0fef4de9e3680aa1fee6ba712fe8f92eb1b6488770b1ba5507c42d8a9f3cb60d7204d30c1878395d403119977b31911c4159dd74fc3dcc2343898298aec14acae8e86dfd5cd3d65631e5c6b8e73321bc46b4cf083ed5ab74b5b04e4abf22ea4a570d1479603c4daadad8e90cde249f4ad29cdbf4d9916e2dd2313ce10b566b9ad81d402e7f24cc909a"], 0x0, 0x0, &(0x7f00000001c0)="0ea655e03fe9d6c6d81ec3bc37d5b54760706c873ae234123769c7ac07921ac64aa08cd9554781804fd28b3abc7fda643d3b675737512992ecec6cf3074761a39dd3ccc32428cb96ca71042e336d03c09c6e2be0776ce39617df801aa64ca041b85d2415f85240d15c7444fa2c5daa47c0ea562b015d2278f776df18db1d4fb6b59b4243d04e859ee1656a8c0942e5e61387fc56c663870859e3298c56d647ae0e4686bdb95512fc0af084060e7f1652b9982fae3f4ccf") ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0xb77c}}, './file0\x00'}) r4 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000300), 0x2, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/199, 0xc7}, {&(0x7f0000000680)=""/184, 0xb8}], 0x2) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$FUSE_IOCTL(r6, &(0x7f00000000c0)={0x20, 0x0, 0x0, {0xfffffffe, 0x0, 0x40510, 0x6}}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r7}}, './file0\x00'}) 19:14:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r3, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000002100)={0x50, 0x0, r4}, 0x50) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0xfffffffffffffff5, r4, {0x3, 0x4, 0x0, {0x6, 0x0, 0x7, 0xd6, 0x81, 0x5, 0xffff, 0x800, 0x1, 0x1000, 0x9, r5, 0xee00, 0xc444, 0x7}}}, 0x78) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc, 0x7, "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", 0x7, 0xc8, 0x5, 0x8, 0x5, 0x1, 0x2, 0x1}}}, 0x120) (async) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000080)={&(0x7f0000001000)={[{&(0x7f0000000040)="c9d099c79343ba1bf0b9fd999cb3adf926d3dd0f224b43", 0x17, 0x3}]}, 0x1, 0x1}, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000000)={0xf, 0x8}, 0x10) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9aca00}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x984090, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d5ad3653d3030303030303030303030303030302c757365725f69643d", @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',blksize=0x0000000000000800,allow_other,fowner>', @ANYRESDEC, @ANYBLOB="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"], 0x0, 0x0, &(0x7f00000001c0)="0ea655e03fe9d6c6d81ec3bc37d5b54760706c873ae234123769c7ac07921ac64aa08cd9554781804fd28b3abc7fda643d3b675737512992ecec6cf3074761a39dd3ccc32428cb96ca71042e336d03c09c6e2be0776ce39617df801aa64ca041b85d2415f85240d15c7444fa2c5daa47c0ea562b015d2278f776df18db1d4fb6b59b4243d04e859ee1656a8c0942e5e61387fc56c663870859e3298c56d647ae0e4686bdb95512fc0af084060e7f1652b9982fae3f4ccf") ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0xb77c}}, './file0\x00'}) r4 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000300), 0x2, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/199, 0xc7}, {&(0x7f0000000680)=""/184, 0xb8}], 0x2) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$FUSE_IOCTL(r6, &(0x7f00000000c0)={0x20, 0x0, 0x0, {0xfffffffe, 0x0, 0x40510, 0x6}}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) (async) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r7}}, './file0\x00'}) 19:14:54 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x400100) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r3, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000100)={{r3, 0x101, 0xfffffffffffffffd, 0x5b62, 0x1a3a, 0x9, 0x4, 0x3, 0x9, 0x6, 0x655, 0x1000, 0x80000001, 0x2, 0x80000001}}) 19:14:54 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x822c0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x440801, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x40, @private2}, r3}}, 0x38) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x4, {0x200, 0x9df2, "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", 0xd0, 0xcb, 0x9, 0x3f, 0x1, 0xff, 0x1, 0x1}}}, 0x128) 19:14:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xa0, 0x1, "9e17d6226e742428dc8d146cb457543088d0dba58b35be2cde054435ed985672280d0958033278a735d6b96b4c209d9c4385083a31e929a927fdce2378dfd47b2cc62d7375a07d6e88f87448e3486e62900171ff3ae18ac842d9be28eff5e2fd35b69f153882bd16b770af9f1d75ae204407abed57ad567c8741482d9cf276099898d2b5df3712a60b1f2515a8f604b1daf0dd6136a97aacc4ea81d33b3e63002b0ca3d5bc2e8495f2eefc8fccb0474237157850d8ce192d39c7a7cbfdf30670e2e51ec8963dbd56e17bc56a2adc5746530daadf30430cfe025297a9432e75bc6314ccc26cadb99d10a74a49e705b8abd9c03a31a75841c2a8b545f895a7094a", 0xd0, 0x4e, 0x3, 0x0, 0x6, 0x5, 0xb8, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b00000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) fstat(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001440)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000001380), 0x2000004, &(0x7f0000001480)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) r3 = epoll_create1(0x80000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000000c0)={{0x0, 0xd4, 0x0, 0x2, 0x3, 0x7, 0xfffffffffffffff9, 0x0, 0x2d, 0xa0, 0x1, 0x0, 0x4, 0x9, 0x1}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000180)={{r4, 0xfffffffffffffffb, 0x7, 0x1f, 0x9, 0x6, 0x4, 0x8, 0x7, 0x3, 0xffffffff, 0xc6, 0x3, 0xc4, 0x2}}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000008, 0x10, r0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001180)) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:54 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x984090, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d5ad3653d3030303030303030303030303030302c757365725f69643d", @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',blksize=0x0000000000000800,allow_other,fowner>', @ANYRESDEC, @ANYBLOB="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"], 0x0, 0x0, &(0x7f00000001c0)="0ea655e03fe9d6c6d81ec3bc37d5b54760706c873ae234123769c7ac07921ac64aa08cd9554781804fd28b3abc7fda643d3b675737512992ecec6cf3074761a39dd3ccc32428cb96ca71042e336d03c09c6e2be0776ce39617df801aa64ca041b85d2415f85240d15c7444fa2c5daa47c0ea562b015d2278f776df18db1d4fb6b59b4243d04e859ee1656a8c0942e5e61387fc56c663870859e3298c56d647ae0e4686bdb95512fc0af084060e7f1652b9982fae3f4ccf") ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0xb77c}}, './file0\x00'}) openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000300), 0x2, 0x0) (async) r4 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000300), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/199, 0xc7}, {&(0x7f0000000680)=""/184, 0xb8}], 0x2) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$FUSE_IOCTL(r6, &(0x7f00000000c0)={0x20, 0x0, 0x0, {0xfffffffe, 0x0, 0x40510, 0x6}}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) (async) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r7}}, './file0\x00'}) 19:14:54 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x400100) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r3, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000100)={{r3, 0x101, 0xfffffffffffffffd, 0x5b62, 0x1a3a, 0x9, 0x4, 0x3, 0x9, 0x6, 0x655, 0x1000, 0x80000001, 0x2, 0x80000001}}) 19:14:54 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) (async) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x822c0, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x440801, 0x0) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x40, @private2}, r3}}, 0x38) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x4, {0x200, 0x9df2, "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", 0xd0, 0xcb, 0x9, 0x3f, 0x1, 0xff, 0x1, 0x1}}}, 0x128) 19:14:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xa0, 0x1, "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", 0xd0, 0x4e, 0x3, 0x0, 0x6, 0x5, 0xb8, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:54 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) fstat(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001440)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000001380), 0x2000004, &(0x7f0000001480)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) (async) r3 = epoll_create1(0x80000) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000000c0)={{0x0, 0xd4, 0x0, 0x2, 0x3, 0x7, 0xfffffffffffffff9, 0x0, 0x2d, 0xa0, 0x1, 0x0, 0x4, 0x9, 0x1}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000180)={{r4, 0xfffffffffffffffb, 0x7, 0x1f, 0x9, 0x6, 0x4, 0x8, 0x7, 0x3, 0xffffffff, 0xc6, 0x3, 0xc4, 0x2}}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000008, 0x10, r0, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001180)) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:54 executing program 4: r0 = syz_io_uring_setup(0x77be, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x9, 0x0, 0x1) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000100)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) 19:14:54 executing program 4: r0 = syz_io_uring_setup(0x77be, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x9, 0x0, 0x1) (async) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x9, 0x0, 0x1) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:14:54 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) (async) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x822c0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x440801, 0x0) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x40, @private2}, r3}}, 0x38) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x4, {0x200, 0x9df2, "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", 0xd0, 0xcb, 0x9, 0x3f, 0x1, 0xff, 0x1, 0x1}}}, 0x128) 19:14:54 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) fstat(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001440)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000001380), 0x2000004, &(0x7f0000001480)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) (async) r3 = epoll_create1(0x80000) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000000c0)={{0x0, 0xd4, 0x0, 0x2, 0x3, 0x7, 0xfffffffffffffff9, 0x0, 0x2d, 0xa0, 0x1, 0x0, 0x4, 0x9, 0x1}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000180)={{r4, 0xfffffffffffffffb, 0x7, 0x1f, 0x9, 0x6, 0x4, 0x8, 0x7, 0x3, 0xffffffff, 0xc6, 0x3, 0xc4, 0x2}}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000008, 0x10, r0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000001180)) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xa0, 0x1, "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", 0xd0, 0x4e, 0x3, 0x0, 0x6, 0x5, 0xb8, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xa0, 0x1, "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", 0xd0, 0x4e, 0x3, 0x0, 0x6, 0x5, 0xb8, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000100)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000100)) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) (async) 19:14:54 executing program 4: r0 = syz_io_uring_setup(0x77be, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x9, 0x0, 0x1) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:14:54 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x74) 19:14:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x0, 0xa9, @rand_addr=' \x01\x00'}, r2}}, 0x38) 19:14:54 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000100)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000100)) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, 0x0) (async) 19:14:54 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x54f5c0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @auto="6a02a3184b8cfe8b3341afc919fff134"}}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x0, 0xa9, @rand_addr=' \x01\x00'}, r2}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x0, 0xa9, @rand_addr=' \x01\x00'}, r2}}, 0x38) (async) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x74) 19:14:54 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) clock_gettime(0x0, &(0x7f0000000000)) 19:14:54 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000002240)=0xffffffffffffffff, 0x12) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000023c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) write$damon_monitor_on(r3, &(0x7f0000002400), 0x3) read$FUSE(r2, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r4}, 0x50) mount$fuse(0x0, &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x23000, &(0x7f00000022c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure}, {@euid_lt}, {@flag='lazytime'}, {@dont_hash}, {@hash}]}}) write$FUSE_BMAP(r2, &(0x7f0000002200)={0x18, 0x0, r4, {0x400}}, 0x18) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, r4, {0x4}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00001000010000002e2f66696c653000"]) 19:14:54 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x54f5c0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @auto="6a02a3184b8cfe8b3341afc919fff134"}}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x54f5c0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @auto="6a02a3184b8cfe8b3341afc919fff134"}}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:14:54 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) clock_gettime(0x0, &(0x7f0000000000)) 19:14:54 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x74) 19:14:54 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x3}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:54 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x54f5c0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={@id={0x2, 0x0, @auto="6a02a3184b8cfe8b3341afc919fff134"}}) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:54 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000002240)=0xffffffffffffffff, 0x12) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000023c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) write$damon_monitor_on(r3, &(0x7f0000002400), 0x3) read$FUSE(r2, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r4}, 0x50) (async) mount$fuse(0x0, &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x23000, &(0x7f00000022c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure}, {@euid_lt}, {@flag='lazytime'}, {@dont_hash}, {@hash}]}}) write$FUSE_BMAP(r2, &(0x7f0000002200)={0x18, 0x0, r4, {0x400}}, 0x18) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, r4, {0x4}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00001000010000002e2f66696c653000"]) 19:14:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x0, 0xa9, @rand_addr=' \x01\x00'}, r2}}, 0x38) 19:14:55 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000002240)=0xffffffffffffffff, 0x12) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000023c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) write$damon_monitor_on(r3, &(0x7f0000002400), 0x3) (async, rerun: 32) read$FUSE(r2, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r4}, 0x50) (async, rerun: 64) mount$fuse(0x0, &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0), 0x23000, &(0x7f00000022c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_measure}, {@euid_lt}, {@flag='lazytime'}, {@dont_hash}, {@hash}]}}) (async, rerun: 64) write$FUSE_BMAP(r2, &(0x7f0000002200)={0x18, 0x0, r4, {0x400}}, 0x18) (async) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, r4, {0x4}}, 0x18) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00001000010000002e2f66696c653000"]) 19:14:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) clock_gettime(0x0, &(0x7f0000000000)) 19:14:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, {0xa, 0x4e21, 0x3ff, @private1, 0x4}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:55 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x2a, 0x6, 0x0, {0x4, 0x2, 0x1, 0x0, '\x00'}}, 0x2a) 19:14:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) read$snapshot(r1, &(0x7f0000000040)=""/18, 0x12) 19:14:55 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x8}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:55 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:14:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x67cdcbef, 0xffffffffffffffff}, './file0\x00'}) mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x8900, &(0x7f0000000040)={0xf1, 0x100000, 0x80000}, 0x20) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) renameat(r3, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000180)='./file0\x00') 19:14:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, {0xa, 0x4e21, 0x3ff, @private1, 0x4}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) read$snapshot(r1, &(0x7f0000000040)=""/18, 0x12) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) read$snapshot(r1, &(0x7f0000000040)=""/18, 0x12) (async) 19:14:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x2a, 0x6, 0x0, {0x4, 0x2, 0x1, 0x0, '\x00'}}, 0x2a) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x2a, 0x6, 0x0, {0x4, 0x2, 0x1, 0x0, '\x00'}}, 0x2a) (async) 19:14:55 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x9}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x67cdcbef, 0xffffffffffffffff}, './file0\x00'}) (async) mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x8900, &(0x7f0000000040)={0xf1, 0x100000, 0x80000}, 0x20) (async, rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) renameat(r3, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000180)='./file0\x00') 19:14:55 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000040)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:14:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, {0xa, 0x4e21, 0x3ff, @private1, 0x4}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) r5 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000080)={0x2a, 0x6, 0x0, {0x4, 0x2, 0x1, 0x0, '\x00'}}, 0x2a) 19:14:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) read$snapshot(r1, &(0x7f0000000040)=""/18, 0x12) 19:14:55 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='memory.swap.max\x00', 0x2, 0x0) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:14:55 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x10}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0xa9) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x8, "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", 0x90, 0x1f, 0x6, 0xaa, 0xc1, 0xff, 0x81, 0x1}, r2}}, 0x128) 19:14:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x67cdcbef, 0xffffffffffffffff}, './file0\x00'}) mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x8900, &(0x7f0000000040)={0xf1, 0x100000, 0x80000}, 0x20) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) renameat(r3, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000180)='./file0\x00') openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x67cdcbef}, './file0\x00'}) (async) mount_setattr(r1, &(0x7f0000000000)='./file0\x00', 0x8900, &(0x7f0000000040)={0xf1, 0x100000, 0x80000}, 0x20) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) (async) renameat(r3, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000180)='./file0\x00') (async) 19:14:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x100, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, r6, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x0, @private2, 0x1}}}, 0xa0) fchmodat(r3, &(0x7f0000000480)='./file0\x00', 0x14) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000540)={@desc={0x1, 0x0, @desc1}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r4, 0x30, 0x0, @ib={0x1b, 0x4, 0x0, {"ecf8cdd16eb3122611b4b342b6f360fb"}, 0x5ed, 0x3, 0x9}}}, 0xa0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x2, 0x2}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000500), 0x50200, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xefff, 0x0, @mcast1}, r1}}, 0x38) 19:14:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002180)='blkio.bfq.sectors\x00', 0x0, 0x0) write$FUSE_INIT(r4, &(0x7f00000021c0)={0x50, 0xfffffffffffffffe, r3, {0x7, 0x27, 0x1d4f, 0x2000, 0xffe0, 0x4, 0x1, 0x6dc}}, 0x50) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r3, {0x7, 0x27, 0x0, 0x2}}, 0x50) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0xfffffffffffffffe, r3, {{0x1, 0x0, 0x1, 0x0, 0x3, 0x8, {0x1, 0x6, 0x0, 0x1ff, 0x8000, 0x100000001, 0x2, 0x1, 0xfff, 0x1000, 0x1, 0xee00, 0xee00, 0x3, 0xf}}, {0x0, 0x12}}}, 0xa0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000002300), 0x2a0040, 0x0) read$FUSE(r4, &(0x7f0000002340)={0x2020, 0x0, 0x0}, 0x2020) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f00000043c0)={0x1, 0x7}, 0x2) write$FUSE_GETXATTR(r5, &(0x7f0000004380)={0x18, 0x0, r6, {0xf34b}}, 0x18) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$FUSE_OPEN(r7, &(0x7f0000004400)={0x20, 0xffffffffffffffda, r3, {0x0, 0x19}}, 0x20) write$FUSE_STATFS(r4, &(0x7f0000002280)={0x60, 0x0, r3, {{0x48fb, 0x3, 0x9, 0xfffffffffffff001, 0x5, 0x8, 0xdca, 0x3f}}}, 0x60) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, 0x0) read$snapshot(r8, &(0x7f0000000100)=""/241, 0xf1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r9, 0xc0406619, 0x0) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r10, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r9, 0xc018937a, &(0x7f0000002240)={{0x1, 0x1, 0x18, r10, {0x7}}, './file0\x00'}) 19:14:55 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) 19:14:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0xa9) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x106, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x8, "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", 0x90, 0x1f, 0x6, 0xaa, 0xc1, 0xff, 0x81, 0x1}, r2}}, 0x128) 19:14:55 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x900}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$smackfs_logging(0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x14) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x100, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, r6, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x0, @private2, 0x1}}}, 0xa0) (async) fchmodat(r3, &(0x7f0000000480)='./file0\x00', 0x14) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000540)={@desc={0x1, 0x0, @desc1}}) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r4, 0x30, 0x0, @ib={0x1b, 0x4, 0x0, {"ecf8cdd16eb3122611b4b342b6f360fb"}, 0x5ed, 0x3, 0x9}}}, 0xa0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x2, 0x2}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000500), 0x50200, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xefff, 0x0, @mcast1}, r1}}, 0x38) 19:14:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002180)='blkio.bfq.sectors\x00', 0x0, 0x0) write$FUSE_INIT(r4, &(0x7f00000021c0)={0x50, 0xfffffffffffffffe, r3, {0x7, 0x27, 0x1d4f, 0x2000, 0xffe0, 0x4, 0x1, 0x6dc}}, 0x50) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r3, {0x7, 0x27, 0x0, 0x2}}, 0x50) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0xfffffffffffffffe, r3, {{0x1, 0x0, 0x1, 0x0, 0x3, 0x8, {0x1, 0x6, 0x0, 0x1ff, 0x8000, 0x100000001, 0x2, 0x1, 0xfff, 0x1000, 0x1, 0xee00, 0xee00, 0x3, 0xf}}, {0x0, 0x12}}}, 0xa0) (async) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000002300), 0x2a0040, 0x0) read$FUSE(r4, &(0x7f0000002340)={0x2020, 0x0, 0x0}, 0x2020) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f00000043c0)={0x1, 0x7}, 0x2) (async) write$FUSE_GETXATTR(r5, &(0x7f0000004380)={0x18, 0x0, r6, {0xf34b}}, 0x18) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$FUSE_OPEN(r7, &(0x7f0000004400)={0x20, 0xffffffffffffffda, r3, {0x0, 0x19}}, 0x20) (async) write$FUSE_STATFS(r4, &(0x7f0000002280)={0x60, 0x0, r3, {{0x48fb, 0x3, 0x9, 0xfffffffffffff001, 0x5, 0x8, 0xdca, 0x3f}}}, 0x60) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, 0x0) read$snapshot(r8, &(0x7f0000000100)=""/241, 0xf1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r9, 0xc0406619, 0x0) (async) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r10, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r9, 0xc018937a, &(0x7f0000002240)={{0x1, 0x1, 0x18, r10, {0x7}}, './file0\x00'}) 19:14:55 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) 19:14:55 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0xca9a3b}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0xa9) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x8, "05450b5d4a6ed56f505c066d9b2043b6a3e540141b20c88aaadb26c20cea8931160c745ac7c9872563d14fe76dadd1102e71f451d3d0c4462471d8a45ea0a3edb4efe5d206551c7cc69e5d6f03c35d6e9ed28decb3d5e732f832606b66e4e6a7d31ddc5eec904f2716ba4168ff7d5f7f20170d5abb2ccee8de2c62ac0ccea2809079609df6b8dc268d5ae5edb27910fa7f9544b79e632f48559f6150aa14f565791f6a4ef7951841bab0225bb6482ba6f92be9634b7a489174c30aa312e6027e1a21e6efc71160d3f72a63df2585abbfa9462eddf0700bfbceba0c4b8c19e71a9a935668bc3a3b190ab678c6cbc6fdcfbabc7361c6e786567af2d253e310c2fa", 0x90, 0x1f, 0x6, 0xaa, 0xc1, 0xff, 0x81, 0x1}, r2}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0xa9) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x106, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x8, "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", 0x90, 0x1f, 0x6, 0xaa, 0xc1, 0xff, 0x81, 0x1}, r2}}, 0x128) (async) 19:14:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$smackfs_logging(0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x14) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x100, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x2, r6, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x0, @private2, 0x1}}}, 0xa0) fchmodat(r3, &(0x7f0000000480)='./file0\x00', 0x14) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000540)={@desc={0x1, 0x0, @desc1}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r4, 0x30, 0x0, @ib={0x1b, 0x4, 0x0, {"ecf8cdd16eb3122611b4b342b6f360fb"}, 0x5ed, 0x3, 0x9}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x3, r4, 0x30, 0x0, @ib={0x1b, 0x4, 0x0, {"ecf8cdd16eb3122611b4b342b6f360fb"}, 0x5ed, 0x3, 0x9}}}, 0xa0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x2, 0x2}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000500), 0x50200, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xefff, 0x0, @mcast1}, r1}}, 0x38) 19:14:55 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) 19:14:55 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x2000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002180)='blkio.bfq.sectors\x00', 0x0, 0x0) write$FUSE_INIT(r4, &(0x7f00000021c0)={0x50, 0xfffffffffffffffe, r3, {0x7, 0x27, 0x1d4f, 0x2000, 0xffe0, 0x4, 0x1, 0x6dc}}, 0x50) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r3, {0x7, 0x27, 0x0, 0x2}}, 0x50) (async) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0xfffffffffffffffe, r3, {{0x1, 0x0, 0x1, 0x0, 0x3, 0x8, {0x1, 0x6, 0x0, 0x1ff, 0x8000, 0x100000001, 0x2, 0x1, 0xfff, 0x1000, 0x1, 0xee00, 0xee00, 0x3, 0xf}}, {0x0, 0x12}}}, 0xa0) (async) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000002300), 0x2a0040, 0x0) (async) read$FUSE(r4, &(0x7f0000002340)={0x2020, 0x0, 0x0}, 0x2020) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f00000043c0)={0x1, 0x7}, 0x2) (async) write$FUSE_GETXATTR(r5, &(0x7f0000004380)={0x18, 0x0, r6, {0xf34b}}, 0x18) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) write$FUSE_OPEN(r7, &(0x7f0000004400)={0x20, 0xffffffffffffffda, r3, {0x0, 0x19}}, 0x20) (async) write$FUSE_STATFS(r4, &(0x7f0000002280)={0x60, 0x0, r3, {{0x48fb, 0x3, 0x9, 0xfffffffffffff001, 0x5, 0x8, 0xdca, 0x3f}}}, 0x60) (async) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, 0x0) (async) read$snapshot(r8, &(0x7f0000000100)=""/241, 0xf1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r9, 0xc0406619, 0x0) (async) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r10, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r9, 0xc018937a, &(0x7f0000002240)={{0x1, 0x1, 0x18, r10, {0x7}}, './file0\x00'}) 19:14:55 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"460bcdf46cfcde6c4f05c06550ff0141", 0x0, 0x0, {0x0, 0x40}, {0x0, 0x4}, 0x6d637c45, [0x57b, 0x8000000000000000, 0x200, 0xffffffff, 0x113, 0x0, 0x5, 0x1, 0x3f, 0x3ff, 0x1, 0xc12c, 0x37, 0x0, 0x7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000001c0)={"95a53dfb2cf55ee232d5075c362bed73", r0, 0x0, {0x81, 0x1b849142}, {0x1, 0x7ff}, 0x0, [0x4, 0x58e, 0x10000, 0x1, 0x3, 0x80, 0x401, 0x9, 0x800, 0xc9a2, 0x1ff, 0x92, 0xb, 0x10000, 0x9, 0x20]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x100, 0x3f, "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", 0x1f, 0x0, 0x81, 0x4, 0x57, 0x2, 0x6}}}, 0x120) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x4000110, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(r2, 0xf, &(0x7f0000000900)={0x8, 0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000400)=""/189, 0xbd}, {&(0x7f0000000000)=""/8, 0x8}, {&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/124, 0x7c}, {&(0x7f0000000680)=""/128, 0x80}, {&(0x7f0000000700)=""/32, 0x20}, {&(0x7f0000000740)=""/135, 0x87}], &(0x7f0000000880)=[0xfff, 0x2e000000000, 0x6, 0x6, 0x0, 0xffffffff, 0x1, 0x6, 0x2]}, 0x20) 19:14:55 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$smackfs_logging(0xffffffffffffffff, &(0x7f0000000000)=0x3, 0x14) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:14:55 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x22, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x10140, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f00000001c0)={{0x0, 0x1, 0xfffffffffffff3c1, 0x2, 0x8, 0x101, 0x4, 0x100, 0x6, 0x5, 0x7f, 0x0, 0x7ff, 0x10000, 0x9}, 0x10, [0x0, 0x0]}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x8c, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2c}}, r1}}, 0x38) 19:14:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x400600) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x8040, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required={0x3, 0x12}, @ioring_restriction_sqe_op={0x1, 0x4}, @ioring_restriction_sqe_flags_required={0x3, 0x7}, @ioring_restriction_sqe_flags_required={0x3, 0x19}, @ioring_restriction_sqe_flags_required={0x3, 0xe}, @ioring_restriction_sqe_op={0x1, 0xf}, @ioring_restriction_sqe_flags_required], 0x7) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x412001) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x8000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 3: write$dsp(0xffffffffffffffff, &(0x7f0000000140)="15d972aafb88bd5c8a236c620348cebb59fa8b20e7b3fd62f2492c4b53eeec015f416d63b30bcd5886a3f92183dc9678ace1313c72ad75cecd622bb033fff120f67046f9bc07ebcd3c34c7cc36c6085189a324f28a2195b8eb1292a306bc6005a3001e2fc4dc14c6e9081e45a069c3c31cda63f7ce4f9c97aa357d1882578727a299d2d994de80736d9aaa4fe10b5f61ae4fc7db10235baaf802d1b2cec27ec2014e8c8695a076b7b7c136c97042580168482477973cb3b22f41f5f333555aba843474b65de86032ce8f476c3656e3ba840d9105a5c2c425c382b3dec4e865a19b85292a602b861c0c3d6cd9799c8b968d5882f7d48d7690bb3a07e6", 0xfc) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x2, 0x7, 0xffffffff}}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300), 0x6040, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x3}}, 0x10) 19:14:56 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"460bcdf46cfcde6c4f05c06550ff0141", 0x0, 0x0, {0x0, 0x40}, {0x0, 0x4}, 0x6d637c45, [0x57b, 0x8000000000000000, 0x200, 0xffffffff, 0x113, 0x0, 0x5, 0x1, 0x3f, 0x3ff, 0x1, 0xc12c, 0x37, 0x0, 0x7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000001c0)={"95a53dfb2cf55ee232d5075c362bed73", r0, 0x0, {0x81, 0x1b849142}, {0x1, 0x7ff}, 0x0, [0x4, 0x58e, 0x10000, 0x1, 0x3, 0x80, 0x401, 0x9, 0x800, 0xc9a2, 0x1ff, 0x92, 0xb, 0x10000, 0x9, 0x20]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x100, 0x3f, "952a3f0b40510d8407410353ecdc2ed8f722515af34301a185c84aadb37f516b097576e3a91271d279ae30baa3491d223e4e9c25baa34dc0effd85ca4875233354d1a5f45d91051f15083a14c321817c003b758ad45a4bb0f51fc5157865e4d931666e631dcabf175cd3e1c60f37ff54e873c8ac4ab08f65fa8ecba95f2cfa902511512b503633beeb6680b4ce1a45aa942b3a91709d36c2f47d138b60b2d28c3628e24f9ce3ebfc6cbf713612d3f707f0f45f2545d8501433dd99e5f2835b80cbb82f5bf33e492e199710d53888c69ddb36ebda8f72f21335248e3813e6365d652ae107335adbcf0fb819a7af856ec526d68962872aa3b65ebd4649e2b78516", 0x1f, 0x0, 0x81, 0x4, 0x57, 0x2, 0x6}}}, 0x120) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x4000110, 0xffffffffffffffff, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(r2, 0xf, &(0x7f0000000900)={0x8, 0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000400)=""/189, 0xbd}, {&(0x7f0000000000)=""/8, 0x8}, {&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/124, 0x7c}, {&(0x7f0000000680)=""/128, 0x80}, {&(0x7f0000000700)=""/32, 0x20}, {&(0x7f0000000740)=""/135, 0x87}], &(0x7f0000000880)=[0xfff, 0x2e000000000, 0x6, 0x6, 0x0, 0xffffffff, 0x1, 0x6, 0x2]}, 0x20) 19:14:56 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x400600) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x8040, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required={0x3, 0x12}, @ioring_restriction_sqe_op={0x1, 0x4}, @ioring_restriction_sqe_flags_required={0x3, 0x7}, @ioring_restriction_sqe_flags_required={0x3, 0x19}, @ioring_restriction_sqe_flags_required={0x3, 0xe}, @ioring_restriction_sqe_op={0x1, 0xf}, @ioring_restriction_sqe_flags_required], 0x7) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x412001) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x400600) (async) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x8040, 0x0) (async) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required={0x3, 0x12}, @ioring_restriction_sqe_op={0x1, 0x4}, @ioring_restriction_sqe_flags_required={0x3, 0x7}, @ioring_restriction_sqe_flags_required={0x3, 0x19}, @ioring_restriction_sqe_flags_required={0x3, 0xe}, @ioring_restriction_sqe_op={0x1, 0xf}, @ioring_restriction_sqe_flags_required], 0x7) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x412001) (async) 19:14:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x22, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x10140, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f00000001c0)={{0x0, 0x1, 0xfffffffffffff3c1, 0x2, 0x8, 0x101, 0x4, 0x100, 0x6, 0x5, 0x7f, 0x0, 0x7ff, 0x10000, 0x9}, 0x10, [0x0, 0x0]}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x8c, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2c}}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x22, 0xfa00, {0x0, &(0x7f0000000080), 0x2, 0x5}}, 0x20) (async) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x10140, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f00000001c0)={{0x0, 0x1, 0xfffffffffffff3c1, 0x2, 0x8, 0x101, 0x4, 0x100, 0x6, 0x5, 0x7f, 0x0, 0x7ff, 0x10000, 0x9}, 0x10, [0x0, 0x0]}) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x8c, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2c}}, r1}}, 0x38) (async) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x9000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:56 executing program 3: write$dsp(0xffffffffffffffff, &(0x7f0000000140)="15d972aafb88bd5c8a236c620348cebb59fa8b20e7b3fd62f2492c4b53eeec015f416d63b30bcd5886a3f92183dc9678ace1313c72ad75cecd622bb033fff120f67046f9bc07ebcd3c34c7cc36c6085189a324f28a2195b8eb1292a306bc6005a3001e2fc4dc14c6e9081e45a069c3c31cda63f7ce4f9c97aa357d1882578727a299d2d994de80736d9aaa4fe10b5f61ae4fc7db10235baaf802d1b2cec27ec2014e8c8695a076b7b7c136c97042580168482477973cb3b22f41f5f333555aba843474b65de86032ce8f476c3656e3ba840d9105a5c2c425c382b3dec4e865a19b85292a602b861c0c3d6cd9799c8b968d5882f7d48d7690bb3a07e6", 0xfc) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x2, 0x7, 0xffffffff}}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300), 0x6040, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x3}}, 0x10) 19:14:56 executing program 2: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"460bcdf46cfcde6c4f05c06550ff0141", 0x0, 0x0, {0x0, 0x40}, {0x0, 0x4}, 0x6d637c45, [0x57b, 0x8000000000000000, 0x200, 0xffffffff, 0x113, 0x0, 0x5, 0x1, 0x3f, 0x3ff, 0x1, 0xc12c, 0x37, 0x0, 0x7]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"460bcdf46cfcde6c4f05c06550ff0141", 0x0, 0x0, {0x0, 0x40}, {0x0, 0x4}, 0x6d637c45, [0x57b, 0x8000000000000000, 0x200, 0xffffffff, 0x113, 0x0, 0x5, 0x1, 0x3f, 0x3ff, 0x1, 0xc12c, 0x37, 0x0, 0x7]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000001c0)={"95a53dfb2cf55ee232d5075c362bed73", r0, 0x0, {0x81, 0x1b849142}, {0x1, 0x7ff}, 0x0, [0x4, 0x58e, 0x10000, 0x1, 0x3, 0x80, 0x401, 0x9, 0x800, 0xc9a2, 0x1ff, 0x92, 0xb, 0x10000, 0x9, 0x20]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000001c0)={"95a53dfb2cf55ee232d5075c362bed73", r0, 0x0, {0x81, 0x1b849142}, {0x1, 0x7ff}, 0x0, [0x4, 0x58e, 0x10000, 0x1, 0x3, 0x80, 0x401, 0x9, 0x800, 0xc9a2, 0x1ff, 0x92, 0xb, 0x10000, 0x9, 0x20]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x100, 0x3f, "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", 0x1f, 0x0, 0x81, 0x4, 0x57, 0x2, 0x6}}}, 0x120) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x4000110, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(r2, 0xf, &(0x7f0000000900)={0x8, 0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000400)=""/189, 0xbd}, {&(0x7f0000000000)=""/8, 0x8}, {&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/124, 0x7c}, {&(0x7f0000000680)=""/128, 0x80}, {&(0x7f0000000700)=""/32, 0x20}, {&(0x7f0000000740)=""/135, 0x87}], &(0x7f0000000880)=[0xfff, 0x2e000000000, 0x6, 0x6, 0x0, 0xffffffff, 0x1, 0x6, 0x2]}, 0x20) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x400600) (async, rerun: 64) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) (rerun: 64) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x8040, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required={0x3, 0x12}, @ioring_restriction_sqe_op={0x1, 0x4}, @ioring_restriction_sqe_flags_required={0x3, 0x7}, @ioring_restriction_sqe_flags_required={0x3, 0x19}, @ioring_restriction_sqe_flags_required={0x3, 0xe}, @ioring_restriction_sqe_op={0x1, 0xf}, @ioring_restriction_sqe_flags_required], 0x7) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x412001) 19:14:56 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x22, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180), 0x10140, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f00000001c0)={{0x0, 0x1, 0xfffffffffffff3c1, 0x2, 0x8, 0x101, 0x4, 0x100, 0x6, 0x5, 0x7f, 0x0, 0x7ff, 0x10000, 0x9}, 0x10, [0x0, 0x0]}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x8c, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2c}}, r1}}, 0x38) 19:14:56 executing program 4: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4000010, 0xffffffffffffffff, 0x83e41000) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000040)={0x10000}, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:56 executing program 3: write$dsp(0xffffffffffffffff, &(0x7f0000000140)="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", 0xfc) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x2, 0x7, 0xffffffff}}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300), 0x6040, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x3}}, 0x10) write$dsp(0xffffffffffffffff, &(0x7f0000000140)="15d972aafb88bd5c8a236c620348cebb59fa8b20e7b3fd62f2492c4b53eeec015f416d63b30bcd5886a3f92183dc9678ace1313c72ad75cecd622bb033fff120f67046f9bc07ebcd3c34c7cc36c6085189a324f28a2195b8eb1292a306bc6005a3001e2fc4dc14c6e9081e45a069c3c31cda63f7ce4f9c97aa357d1882578727a299d2d994de80736d9aaa4fe10b5f61ae4fc7db10235baaf802d1b2cec27ec2014e8c8695a076b7b7c136c97042580168482477973cb3b22f41f5f333555aba843474b65de86032ce8f476c3656e3ba840d9105a5c2c425c382b3dec4e865a19b85292a602b861c0c3d6cd9799c8b968d5882f7d48d7690bb3a07e6", 0xfc) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x2, 0x7, 0xffffffff}}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300), 0x6040, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r4, 0x3}}, 0x10) (async) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x3b9aca00}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) 19:14:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) 19:14:56 executing program 4: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4000010, 0xffffffffffffffff, 0x83e41000) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000040)={0x10000}, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) 19:14:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async, rerun: 32) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0xca9a3b00000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) 19:14:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) 19:14:56 executing program 4: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4000010, 0xffffffffffffffff, 0x83e41000) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000040)={0x10000}, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4000010, 0xffffffffffffffff, 0x83e41000) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000040)={0x10000}, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) 19:14:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x200000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000100)=[r3]}, 0x1) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) 19:14:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) (async) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x800000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) 19:14:56 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) 19:14:56 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) 19:14:56 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000100)=[r3]}, 0x1) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000100)=[r3]}, 0x1) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001740), 0x40000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000000c0)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000300)={0x75d, 0x0, &(0x7f0000000040)=[r4, r0, r5, 0xffffffffffffffff]}, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) io_uring_register$IORING_REGISTER_PBUF_RING(r5, 0x16, &(0x7f0000001700)={&(0x7f0000002000)={[{&(0x7f0000000340)="e17ae2007e97d28353dba79642364b9e59a6780ea54d4e6dc6770ea04d43afdf67dacd4c62da2746389b58b1db6a31bf89b26351994f6eb3e007b7613e8fe6cbbf3c0fc5e1942e140d3c7f3148b61614fae12cd401209e036e99e039b9f5d45e1f699cc17bffdb4128e5c3592d3940b2fce28be8c655bfa44538743cbfc27f7b46030d4276e10b2f7937d556fb4255f7d7b1478c3678d8f7422c21bcd5830610aa61ea12deb7d19152bcfeb4d296e98e916866a7e23791587aca4928a09267e58eeece0be89b4c9449ef452798", 0xcd, 0x3}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="686fc850a7e6a9b43f53732518374270eb5ef512fb2650cd639d6d822e48178ab9ae4bffd7df3e7605d53f4d76d916eb00df60b0f0c22252fdc23313edc2ebfacfb12e0f1438f3fee75ebe0a8a1a356eef133849e932c0c67c64f3a98122ebf3ba3000b245aabb82688bcdd506b1e1cf09655fa703cb89c7c6c450280c8dda7e51139df87b350912d3f6ef5bbdbef92615e993cc944b8a57e4ade85ee1c748d61d73da1ea3b67dd135d30d401fa855cfabebf6ac745691c37e07ce66e51b", 0xbe, 0x2}, {&(0x7f0000001500)="01a2f7e6d46ec134388bf0f47c70b32f5b5f8e6c6165fb8b985f0a81abd164c8080d8505c3a5de81761c8adc007aa1a86727ecbad4c0eb26afaff63aa80fe4d78599eff43b3f1792a1441a6bcc97c650fc9d58f2550d0ee2c0b3583bc9a08b004e27bf9599b7c75e0338cb8de3c5905a45522870e8176c4d0bd116e5358fe4bf84b401ee804e58fe3ace725a4d0e582c3686a89b0aea383c9f8166983a307459c6269402c229f79a769cdd70cc2c1d0a70c4c84f88440426ee2ed4f2e331b3140ea4", 0xc2, 0x2}, {&(0x7f0000001600)="d391ac1f49324a5df04fda6a", 0xc, 0xf001}, {&(0x7f0000001640)="3b492c690a8e519274a10067e173bdf6aeb02d0df0806509cfe46e2a442834b6b5104b86b71c8ea4eeed7f60c77170947a510dd22de20a1e2047966d9d50c0de9d17d7f09670677c63c164015f73c9a7bd1bde58e1b819a921da28783334c960755f61750dd63f989e3c31b6e2b2c1da8c577d00b2d55d9c67897c7496b74573bbfb2c82dc0502e3f8a010739503d6b229a364165bcf825cc75d216f7a809fe965c5b6ad17e6766fd050b64a992c94ec611666aa96c20234b80c6c", 0xbb}]}, 0x6, 0x1}, 0x1) 19:14:56 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x900000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:56 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 19:14:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x4a4800, 0x0) 19:14:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x531680, 0x0) 19:14:56 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000100)=[r3]}, 0x1) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async, rerun: 64) openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x4a4800, 0x0) (rerun: 64) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x1000000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001740), 0x40000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000000c0)) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000300)={0x75d, 0x0, &(0x7f0000000040)=[r4, r0, r5, 0xffffffffffffffff]}, 0x4) (async, rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) (async) io_uring_register$IORING_REGISTER_PBUF_RING(r5, 0x16, &(0x7f0000001700)={&(0x7f0000002000)={[{&(0x7f0000000340)="e17ae2007e97d28353dba79642364b9e59a6780ea54d4e6dc6770ea04d43afdf67dacd4c62da2746389b58b1db6a31bf89b26351994f6eb3e007b7613e8fe6cbbf3c0fc5e1942e140d3c7f3148b61614fae12cd401209e036e99e039b9f5d45e1f699cc17bffdb4128e5c3592d3940b2fce28be8c655bfa44538743cbfc27f7b46030d4276e10b2f7937d556fb4255f7d7b1478c3678d8f7422c21bcd5830610aa61ea12deb7d19152bcfeb4d296e98e916866a7e23791587aca4928a09267e58eeece0be89b4c9449ef452798", 0xcd, 0x3}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="686fc850a7e6a9b43f53732518374270eb5ef512fb2650cd639d6d822e48178ab9ae4bffd7df3e7605d53f4d76d916eb00df60b0f0c22252fdc23313edc2ebfacfb12e0f1438f3fee75ebe0a8a1a356eef133849e932c0c67c64f3a98122ebf3ba3000b245aabb82688bcdd506b1e1cf09655fa703cb89c7c6c450280c8dda7e51139df87b350912d3f6ef5bbdbef92615e993cc944b8a57e4ade85ee1c748d61d73da1ea3b67dd135d30d401fa855cfabebf6ac745691c37e07ce66e51b", 0xbe, 0x2}, {&(0x7f0000001500)="01a2f7e6d46ec134388bf0f47c70b32f5b5f8e6c6165fb8b985f0a81abd164c8080d8505c3a5de81761c8adc007aa1a86727ecbad4c0eb26afaff63aa80fe4d78599eff43b3f1792a1441a6bcc97c650fc9d58f2550d0ee2c0b3583bc9a08b004e27bf9599b7c75e0338cb8de3c5905a45522870e8176c4d0bd116e5358fe4bf84b401ee804e58fe3ace725a4d0e582c3686a89b0aea383c9f8166983a307459c6269402c229f79a769cdd70cc2c1d0a70c4c84f88440426ee2ed4f2e331b3140ea4", 0xc2, 0x2}, {&(0x7f0000001600)="d391ac1f49324a5df04fda6a", 0xc, 0xf001}, {&(0x7f0000001640)="3b492c690a8e519274a10067e173bdf6aeb02d0df0806509cfe46e2a442834b6b5104b86b71c8ea4eeed7f60c77170947a510dd22de20a1e2047966d9d50c0de9d17d7f09670677c63c164015f73c9a7bd1bde58e1b819a921da28783334c960755f61750dd63f989e3c31b6e2b2c1da8c577d00b2d55d9c67897c7496b74573bbfb2c82dc0502e3f8a010739503d6b229a364165bcf825cc75d216f7a809fe965c5b6ad17e6766fd050b64a992c94ec611666aa96c20234b80c6c", 0xbb}]}, 0x6, 0x1}, 0x1) 19:14:57 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 19:14:57 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x531680, 0x0) 19:14:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x4a4800, 0x0) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 19:14:57 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000010000001800004906a8d2c5e4c77486f00f7d96dfa8015a093c1ab5d807000000000000ff3fb3ba6f06f4f020b557e9e6ec562c6d3b80fcb5d0f3637c36e272f1d5ee087360d1a49085a2485cf29c62e4739cf8cdc27900d31d85812497cb33b111c08abbba52af9334a6a9fc2074834f9a237f89d23c0860b463abfa1ecb8e98a027caab92f86681ba016b1fce00"/160, @ANYRES32=r1, @ANYBLOB="ffff0000000000002e2f66696c653000"]) r2 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001740), 0x40000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000000c0)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000300)={0x75d, 0x0, &(0x7f0000000040)=[r4, r0, r5, 0xffffffffffffffff]}, 0x4) (async, rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) (async) io_uring_register$IORING_REGISTER_PBUF_RING(r5, 0x16, &(0x7f0000001700)={&(0x7f0000002000)={[{&(0x7f0000000340)="e17ae2007e97d28353dba79642364b9e59a6780ea54d4e6dc6770ea04d43afdf67dacd4c62da2746389b58b1db6a31bf89b26351994f6eb3e007b7613e8fe6cbbf3c0fc5e1942e140d3c7f3148b61614fae12cd401209e036e99e039b9f5d45e1f699cc17bffdb4128e5c3592d3940b2fce28be8c655bfa44538743cbfc27f7b46030d4276e10b2f7937d556fb4255f7d7b1478c3678d8f7422c21bcd5830610aa61ea12deb7d19152bcfeb4d296e98e916866a7e23791587aca4928a09267e58eeece0be89b4c9449ef452798", 0xcd, 0x3}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="686fc850a7e6a9b43f53732518374270eb5ef512fb2650cd639d6d822e48178ab9ae4bffd7df3e7605d53f4d76d916eb00df60b0f0c22252fdc23313edc2ebfacfb12e0f1438f3fee75ebe0a8a1a356eef133849e932c0c67c64f3a98122ebf3ba3000b245aabb82688bcdd506b1e1cf09655fa703cb89c7c6c450280c8dda7e51139df87b350912d3f6ef5bbdbef92615e993cc944b8a57e4ade85ee1c748d61d73da1ea3b67dd135d30d401fa855cfabebf6ac745691c37e07ce66e51b", 0xbe, 0x2}, {&(0x7f0000001500)="01a2f7e6d46ec134388bf0f47c70b32f5b5f8e6c6165fb8b985f0a81abd164c8080d8505c3a5de81761c8adc007aa1a86727ecbad4c0eb26afaff63aa80fe4d78599eff43b3f1792a1441a6bcc97c650fc9d58f2550d0ee2c0b3583bc9a08b004e27bf9599b7c75e0338cb8de3c5905a45522870e8176c4d0bd116e5358fe4bf84b401ee804e58fe3ace725a4d0e582c3686a89b0aea383c9f8166983a307459c6269402c229f79a769cdd70cc2c1d0a70c4c84f88440426ee2ed4f2e331b3140ea4", 0xc2, 0x2}, {&(0x7f0000001600)="d391ac1f49324a5df04fda6a", 0xc, 0xf001}, {&(0x7f0000001640)="3b492c690a8e519274a10067e173bdf6aeb02d0df0806509cfe46e2a442834b6b5104b86b71c8ea4eeed7f60c77170947a510dd22de20a1e2047966d9d50c0de9d17d7f09670677c63c164015f73c9a7bd1bde58e1b819a921da28783334c960755f61750dd63f989e3c31b6e2b2c1da8c577d00b2d55d9c67897c7496b74573bbfb2c82dc0502e3f8a010739503d6b229a364165bcf825cc75d216f7a809fe965c5b6ad17e6766fd050b64a992c94ec611666aa96c20234b80c6c", 0xbb}]}, 0x6, 0x1}, 0x1) 19:14:57 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x531680, 0x0) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x8}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r3}}, 0x38) 19:14:57 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000010000001800004906a8d2c5e4c77486f00f7d96dfa8015a093c1ab5d807000000000000ff3fb3ba6f06f4f020b557e9e6ec562c6d3b80fcb5d0f3637c36e272f1d5ee087360d1a49085a2485cf29c62e4739cf8cdc27900d31d85812497cb33b111c08abbba52af9334a6a9fc2074834f9a237f89d23c0860b463abfa1ecb8e98a027caab92f86681ba016b1fce00"/160, @ANYRES32=r1, @ANYBLOB="ffff0000000000002e2f66696c653000"]) (async, rerun: 64) r2 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) 19:14:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002080)={0x50, 0x0, r1, {0x7, 0x27, 0x5, 0x84, 0x200, 0x0, 0x3, 0x9}}, 0x50) 19:14:57 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="001000ce8e0000002e2f66696e653000ccddaf58ca98b03681dd3d3adf90cffeb46a8bd3872dd1d0dbe1f127190a0872e422664d835ff7e792ed404b8006e0a7261a981222a307973e8e2df86ce648df"]) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:14:57 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r3}}, 0x38) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async, rerun: 64) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 64) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) 19:14:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002080)={0x50, 0x0, r1, {0x7, 0x27, 0x5, 0x84, 0x200, 0x0, 0x3, 0x9}}, 0x50) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x9}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="001000ce8e0000002e2f66696e653000ccddaf58ca98b03681dd3d3adf90cffeb46a8bd3872dd1d0dbe1f127190a0872e422664d835ff7e792ed404b8006e0a7261a981222a307973e8e2df86ce648df"]) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:14:57 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x101100, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000010000001800004906a8d2c5e4c77486f00f7d96dfa8015a093c1ab5d807000000000000ff3fb3ba6f06f4f020b557e9e6ec562c6d3b80fcb5d0f3637c36e272f1d5ee087360d1a49085a2485cf29c62e4739cf8cdc27900d31d85812497cb33b111c08abbba52af9334a6a9fc2074834f9a237f89d23c0860b463abfa1ecb8e98a027caab92f86681ba016b1fce00"/160, @ANYRES32=r1, @ANYBLOB="ffff0000000000002e2f66696c653000"]) r2 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:14:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002080)={0x50, 0x0, r1, {0x7, 0x27, 0x5, 0x84, 0x200, 0x0, 0x3, 0x9}}, 0x50) 19:14:57 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r3}}, 0x38) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) 19:14:57 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="001000ce8e0000002e2f66696e653000ccddaf58ca98b03681dd3d3adf90cffeb46a8bd3872dd1d0dbe1f127190a0872e422664d835ff7e792ed404b8006e0a7261a981222a307973e8e2df86ce648df"]) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="001000ce8e0000002e2f66696e653000ccddaf58ca98b03681dd3d3adf90cffeb46a8bd3872dd1d0dbe1f127190a0872e422664d835ff7e792ed404b8006e0a7261a981222a307973e8e2df86ce648df"]) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) (async) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x10}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="81feedff0100000018000000", @ANYRESDEC=0x0, @ANYRES16=0x0]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@reiserfs_3={0xc, 0x3, {0x0, 0x5, 0x3}}, &(0x7f0000000480), 0x1000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$smackfs_onlycap(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000100)={@id={0x2, 0x0, @b}}) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) r6 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r6, 0x0, 0xb9) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0xfffff264, "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", 0x0, 0x6, 0x8, 0x1, 0x78, 0x9, 0x40, 0x1}, r10}}, 0x128) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r8, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000180)={{r8, 0x44a1411c, 0x8, 0x1, 0x400, 0xff, 0xc7, 0x6, 0x9, 0x6d, 0x6, 0x6, 0x9, 0x8, 0x8000}, 0x10, [0x0, 0x0]}) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @c}}) 19:14:57 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sync() r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) getdents(r0, &(0x7f00000000c0)=""/180, 0xb4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x2a, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) sync() 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2c88c0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x900}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000040)=0x2, 0x14) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2c88c0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:57 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) 19:14:57 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="81feedff0100000018000000", @ANYRESDEC=0x0, @ANYRES16=0x0]) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@reiserfs_3={0xc, 0x3, {0x0, 0x5, 0x3}}, &(0x7f0000000480), 0x1000) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) r3 = openat$smackfs_onlycap(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000100)={@id={0x2, 0x0, @b}}) (async) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) r6 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r6, 0x0, 0xb9) (async) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0xfffff264, "2b5024525eb029c5ea2908ea0fedfd36bc11ef1b738e8859104cc1107c4be5da9768ee5af3478b2071c3996cec6082a7034a5b3008473591eca093498535ebdfe091942010f7c77ce1b20078eb02a6283724f9457cc446d26a92460280a4bdea59eb18433a442df3f77bb962a035744dda5ce81ced62a277ea2197f98ee3ccac9f52cf653cb9f5aefbbb08512ed0a93ba10d2f723445c8ba8465f3298c0a3ab83d768f5ab0acbf2dbb8f68d98774f04e30316f16fb400e5b1d1e6da48944cb17fbdd74e16260e72bb85cab6312e6885e0e184412eec74bc793bba960f08bbf2e9264ab8e0f70c9b161de2401525117e4afbca575ddb41538c96ed550cfb3e883", 0x0, 0x6, 0x8, 0x1, 0x78, 0x9, 0x40, 0x1}, r10}}, 0x128) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r8, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000180)={{r8, 0x44a1411c, 0x8, 0x1, 0x400, 0xff, 0xc7, 0x6, 0x9, 0x6d, 0x6, 0x6, 0x9, 0x8, 0x8000}, 0x10, [0x0, 0x0]}) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @c}}) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0xca9a3b}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000040)=0x2, 0x14) 19:14:57 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) (async) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2c88c0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:57 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sync() r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) getdents(r0, &(0x7f00000000c0)=""/180, 0xb4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x2a, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) sync() (async) sync() 19:14:57 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)=ANY=[@ANYBLOB="81feedff0100000018000000", @ANYRESDEC=0x0, @ANYRES16=0x0]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) name_to_handle_at(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@reiserfs_3={0xc, 0x3, {0x0, 0x5, 0x3}}, &(0x7f0000000480), 0x1000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$smackfs_onlycap(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) (async) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, &(0x7f0000000100)={@id={0x2, 0x0, @b}}) (async) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) (async, rerun: 32) r6 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (rerun: 32) write$smackfs_ipv6host(r6, 0x0, 0xb9) (async) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x3, {0x8, 0xfffff264, "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", 0x0, 0x6, 0x8, 0x1, 0x78, 0x9, 0x40, 0x1}, r10}}, 0x128) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r8, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000180)={{r8, 0x44a1411c, 0x8, 0x1, 0x400, 0xff, 0xc7, 0x6, 0x9, 0x6d, 0x6, 0x6, 0x9, 0x8, 0x8000}, 0x10, [0x0, 0x0]}) (async, rerun: 64) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 64) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, &(0x7f0000000000)={@id={0x2, 0x0, @c}}) 19:14:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000040)=0x2, 0x14) (async) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000040)=0x2, 0x14) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x9, 0x3, "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", 0x2, 0x2, 0xcd, 0x83, 0x5, 0x9, 0x4}, r2}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x2000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) 19:14:57 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x8000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x9, 0x3, "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", 0x2, 0x2, 0xcd, 0x83, 0x5, 0x9, 0x4}, r2}}, 0x120) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:14:58 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sync() r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) getdents(r0, &(0x7f00000000c0)=""/180, 0xb4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x2a, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) sync() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) sync() (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) getdents(r0, &(0x7f00000000c0)=""/180, 0xb4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x2a, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) sync() (async) 19:14:58 executing program 3: write$damon_monitor_on(0xffffffffffffffff, &(0x7f0000000080), 0x3) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x2}}, 0x20) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x9000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x44040) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000100), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 19:14:58 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getdents(r1, &(0x7f00000000c0)=""/4096, 0x1000) 19:14:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x9, 0x3, "06dc08697479687df1d15b8cb4b76f9930b5b716e51a056c8e8682133d2cd6f40baca456a6729f6600e5e86e81813643a43e3219b2d2a61faa3a79b2e6e3c2318acd43a932b7787d8efc0d3582833578cd92e72fbf2b4488ab6113f9684ec76749d931a74fbfafd8acbcbd7d24dcee92e917a1931856d854f98c339b284204f1279f47edd4a6aeba5c8602a7a2a775ea6b5374f1d262a6943c282132ee5eda439fa25b675c8724253d9eb36e48aa84d5b52a21428b9bf800aedc7f606441cd86989524d18a45fd6bcc222cf944b6053c94300c51143d2a98e831cad21cf81234ea719d2cf431e21bf5c979b0af99df39ee3e940218fea0d6950872d5313a96d3", 0x2, 0x2, 0xcd, 0x83, 0x5, 0x9, 0x4}, r2}}, 0x120) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 3: write$damon_monitor_on(0xffffffffffffffff, &(0x7f0000000080), 0x3) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x2}}, 0x20) 19:14:58 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x44040) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000100), 0x2, 0x0) (async, rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 32) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 19:14:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:58 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getdents(r1, &(0x7f00000000c0)=""/4096, 0x1000) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) getdents(r1, &(0x7f00000000c0)=""/4096, 0x1000) (async) 19:14:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0xc}}, 0x10) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e20, 0x33, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, r5}}, 0x38) 19:14:58 executing program 3: write$damon_monitor_on(0xffffffffffffffff, &(0x7f0000000080), 0x3) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x2}}, 0x20) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x3b9aca00}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:14:58 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getdents(r1, &(0x7f00000000c0)=""/4096, 0x1000) 19:14:58 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x44040) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000100), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x44040) (async) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) openat$cgroup_freezer_state(r1, &(0x7f0000000100), 0x2, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) (async) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0xca9a3b00000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) fstat(r1, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$smackfs_logging(r2, &(0x7f0000000040)=0x1, 0x14) 19:14:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0xc}}, 0x10) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e20, 0x33, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, r5}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0xc}}, 0x10) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e20, 0x33, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, r5}}, 0x38) (async) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x200000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) fstat(r1, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0}}, 0x20) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$smackfs_logging(r2, &(0x7f0000000040)=0x1, 0x14) 19:14:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) 19:14:58 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000058b3016d5b2f15affffdffdac6"]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x6) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) r4 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x701082, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r9, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0xccf9, 0x0, &(0x7f0000000340)=[r5, r5, r1, 0xffffffffffffffff, r3, r8, r9, r4]}, 0x8) mount$fuse(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="000035000000de000000", @ANYRESDEC=0x0, @ANYBLOB=',defcontext=system_u,smackfsfloor=/proc/self\x00,\x00']) 19:14:58 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x5c2c0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000020c0), 0x4000, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r4, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5, {0x7, 0x27, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x400}}, 0x50) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000002240)={0x18, 0x0, r5, {0x7364}}, 0x18) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000002080)={0x20, 0x0, r2, {0xffffffff, 0x4, 0x5, 0x2}}, 0x20) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000002180)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) openat$cgroup_devices(r6, &(0x7f0000002280)='devices.allow\x00', 0x2, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x6, &(0x7f0000002200)={0x20000000, 0x0, &(0x7f00000021c0)=[r1, r7, r1]}, 0x3) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000002140), 0x2, 0x0) 19:14:58 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0xc}}, 0x10) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e20, 0x33, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, r5}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0xc}}, 0x10) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e20, 0x33, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, r5}}, 0x38) (async) 19:14:58 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x5c2c0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000020c0), 0x4000, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r4, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5, {0x7, 0x27, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x400}}, 0x50) (async) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000002240)={0x18, 0x0, r5, {0x7364}}, 0x18) (async) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000002080)={0x20, 0x0, r2, {0xffffffff, 0x4, 0x5, 0x2}}, 0x20) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000002180)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) openat$cgroup_devices(r6, &(0x7f0000002280)='devices.allow\x00', 0x2, 0x0) (async) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x6, &(0x7f0000002200)={0x20000000, 0x0, &(0x7f00000021c0)=[r1, r7, r1]}, 0x3) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000002140), 0x2, 0x0) 19:14:58 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000058b3016d5b2f15affffdffdac6"]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x6) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) r4 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x701082, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r9, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0xccf9, 0x0, &(0x7f0000000340)=[r5, r5, r1, 0xffffffffffffffff, r3, r8, r9, r4]}, 0x8) mount$fuse(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="000035000000de000000", @ANYRESDEC=0x0, @ANYBLOB=',defcontext=system_u,smackfsfloor=/proc/self\x00,\x00']) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000058b3016d5b2f15affffdffdac6"]) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x6) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) (async) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x701082, 0x0) (async) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r9, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0xccf9, 0x0, &(0x7f0000000340)=[r5, r5, r1, 0xffffffffffffffff, r3, r8, r9, r4]}, 0x8) (async) mount$fuse(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="000035000000de000000", @ANYRESDEC=0x0, @ANYBLOB=',defcontext=system_u,smackfsfloor=/proc/self\x00,\x00']) (async) 19:14:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) fstat(r1, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$smackfs_logging(r2, &(0x7f0000000040)=0x1, 0x14) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYBLOB="01000000000000802e2f66696c653000"]) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xfffd, 0xfffffffc, @private2, 0xfffffffd}, r6}}, 0x38) 19:14:58 executing program 2: write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) io_uring_setup(0x4877, &(0x7f0000000100)={0x0, 0xae44, 0x80, 0x3, 0x86}) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card3/oss_mixer\x00', 0x80200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:58 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="00000058b3016d5b2f15affffdffdac6"]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async, rerun: 32) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x6) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) (async) r4 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000140), 0x701082, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async, rerun: 32) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r9, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r7, 0x6, &(0x7f0000000380)={0xccf9, 0x0, &(0x7f0000000340)=[r5, r5, r1, 0xffffffffffffffff, r3, r8, r9, r4]}, 0x8) (async) mount$fuse(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="000035000000de000000", @ANYRESDEC=0x0, @ANYBLOB=',defcontext=system_u,smackfsfloor=/proc/self\x00,\x00']) 19:14:58 executing program 2: write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYBLOB="01000000000000802e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xfffd, 0xfffffffc, @private2, 0xfffffffd}, r6}}, 0x38) 19:14:58 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x5c2c0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000020c0), 0x4000, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r4, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000002100)={0x50, 0x0, r5, {0x7, 0x27, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x400}}, 0x50) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000002240)={0x18, 0x0, r5, {0x7364}}, 0x18) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000002080)={0x20, 0x0, r2, {0xffffffff, 0x4, 0x5, 0x2}}, 0x20) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000002180)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000002180)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) openat$cgroup_devices(r6, &(0x7f0000002280)='devices.allow\x00', 0x2, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x6, &(0x7f0000002200)={0x20000000, 0x0, &(0x7f00000021c0)=[r1, r7, r1]}, 0x3) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x6, &(0x7f0000002200)={0x20000000, 0x0, &(0x7f00000021c0)=[r1, r7, r1]}, 0x3) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000002140), 0x2, 0x0) 19:14:58 executing program 2: write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000340)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYBLOB="01000000000000802e2f66696c653000"]) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xfffd, 0xfffffffc, @private2, 0xfffffffd}, r6}}, 0x38) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) io_uring_setup(0x4877, &(0x7f0000000100)={0x0, 0xae44, 0x80, 0x3, 0x86}) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card3/oss_mixer\x00', 0x80200, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:58 executing program 1: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x301702, 0x0) 19:14:58 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x6}, 0x2) 19:14:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x401, "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", 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0xe4, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r2, 0xf}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xfffffffe, 0x80000001, "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", 0x9, 0x1d, 0x20, 0x7, 0x6, 0x9b, 0xfa, 0x1}, r2}}, 0x120) 19:14:58 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) io_uring_setup(0x4877, &(0x7f0000000100)={0x0, 0xae44, 0x80, 0x3, 0x86}) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card3/oss_mixer\x00', 0x80200, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x6}, 0x2) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x6}, 0x2) (async) 19:14:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) (async) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x301702, 0x0) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 5: read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/77, 0x4d) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00$/file0\x00']) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) 19:14:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x401, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0xe4, 0x1}, r2}}, 0x120) (async, rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r2, 0xf}}, 0x10) (rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xfffffffe, 0x80000001, "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", 0x9, 0x1d, 0x20, 0x7, 0x6, 0x9b, 0xfa, 0x1}, r2}}, 0x120) 19:14:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x9}}, 0xffffffffffffffe8) write$damon_schemes(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x81, 0x20, 0x20, 0x3f, 0x9, 0xa8f5}, 0x66) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x6}, 0x2) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 1: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x301702, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) (async) openat$capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x301702, 0x0) (async) 19:14:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x401, "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", 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0xe4, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r2, 0xf}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xfffffffe, 0x80000001, "e7e262b6d4e6f278c6cb2e3445d9321c9d405ce5be5a75fcbaa5bf4a848b73707fa558cfaa8edcd85cd2d32dd278618b646aa22506930710039d3a7f54b259662a8c8638d913b4ce245b767f341101633590c88044dae258fffdd28baf51de3a7bc6167fba19a27292d2b452cc89ce2ab4aa648790f8b30c831932a81857a4b89eac2c8ac18412305ff781e69ff19d633773d36d97274e3e9f68303b1bab11dbea42583581ccb69fe9ae36f451f399bc6b5c0c9096ad1601dbcacd4212e4e87f1fbf2d6b34844f96334d0be4e4fbcf61b6c69465fda11e65e15e4da09fbecc9bc70a22e9cedd6a82bfbac3763d34b1463a740280b74f36e3be3f509501fda20c", 0x9, 0x1d, 0x20, 0x7, 0x6, 0x9b, 0xfa, 0x1}, r2}}, 0x120) 19:14:59 executing program 5: read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/77, 0x4d) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00$/file0\x00']) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) 19:14:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x9}}, 0xffffffffffffffe8) write$damon_schemes(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x81, 0x20, 0x20, 0x3f, 0x9, 0xa8f5}, 0x66) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x488300, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x10}, 0x10) read$proc_mixer(r1, &(0x7f0000000100)=""/31, 0x1f) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:59 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004140)={0x148, 0x0, 0x0, [{{0x6, 0x0, 0x2, 0x1, 0x8001, 0x40, {0x3, 0xe8bf, 0x8317, 0x800, 0x8ac, 0xfff, 0x3, 0x1f, 0x8, 0x6000, 0x67cf, r0, 0x0, 0x81, 0x4}}, {0x2, 0x7, 0x2, 0xebeb, '^$'}}, {{0x0, 0x1, 0xfff, 0x6, 0x81, 0x3f2, {0x0, 0x8001000, 0x6, 0xab, 0x5f, 0x7ff, 0x3ff, 0x81, 0x9, 0xc000, 0x6b, r1, 0x0, 0x6, 0x401}}, {0x2, 0x9b38, 0x0, 0x4}}]}, 0x148) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x400100) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, {{0x8001, 0x0, 0x2}}}, 0x28) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x8}, 0x2) 19:14:59 executing program 5: read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/77, 0x4d) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00$/file0\x00']) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (rerun: 64) 19:14:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x9}}, 0xffffffffffffffe8) write$damon_schemes(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x81, 0x20, 0x20, 0x3f, 0x9, 0xa8f5}, 0x66) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004140)={0x148, 0x0, 0x0, [{{0x6, 0x0, 0x2, 0x1, 0x8001, 0x40, {0x3, 0xe8bf, 0x8317, 0x800, 0x8ac, 0xfff, 0x3, 0x1f, 0x8, 0x6000, 0x67cf, r0, 0x0, 0x81, 0x4}}, {0x2, 0x7, 0x2, 0xebeb, '^$'}}, {{0x0, 0x1, 0xfff, 0x6, 0x81, 0x3f2, {0x0, 0x8001000, 0x6, 0xab, 0x5f, 0x7ff, 0x3ff, 0x81, 0x9, 0xc000, 0x6b, r1, 0x0, 0x6, 0x401}}, {0x2, 0x9b38, 0x0, 0x4}}]}, 0x148) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:59 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x400100) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, {{0x8001, 0x0, 0x2}}}, 0x28) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x8}, 0x2) 19:14:59 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"b45c5e749961ffc9808d256a9636533f", r0, r1, {0xbda9, 0x9}, {0x7}, 0x4, [0x2, 0x7, 0x6, 0x1000, 0xfffffffffffffff7, 0x1, 0x4, 0x40, 0x8, 0x2, 0x100, 0x1, 0x38, 0x1, 0x8, 0x6]}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r3}}, 0x38) 19:14:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x488300, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x10}, 0x10) read$proc_mixer(r1, &(0x7f0000000100)=""/31, 0x1f) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async, rerun: 64) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0xca9a3b}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004140)={0x148, 0x0, 0x0, [{{0x6, 0x0, 0x2, 0x1, 0x8001, 0x40, {0x3, 0xe8bf, 0x8317, 0x800, 0x8ac, 0xfff, 0x3, 0x1f, 0x8, 0x6000, 0x67cf, r0, 0x0, 0x81, 0x4}}, {0x2, 0x7, 0x2, 0xebeb, '^$'}}, {{0x0, 0x1, 0xfff, 0x6, 0x81, 0x3f2, {0x0, 0x8001000, 0x6, 0xab, 0x5f, 0x7ff, 0x3ff, 0x81, 0x9, 0xc000, 0x6b, r1, 0x0, 0x6, 0x401}}, {0x2, 0x9b38, 0x0, 0x4}}]}, 0x148) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:14:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (rerun: 32) 19:14:59 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x400100) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, {{0x8001, 0x0, 0x2}}}, 0x28) (async, rerun: 32) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x8}, 0x2) (rerun: 32) 19:14:59 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"b45c5e749961ffc9808d256a9636533f", r0, r1, {0xbda9, 0x9}, {0x7}, 0x4, [0x2, 0x7, 0x6, 0x1000, 0xfffffffffffffff7, 0x1, 0x4, 0x40, 0x8, 0x2, 0x100, 0x1, 0x38, 0x1, 0x8, 0x6]}) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r3}}, 0x38) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x488300, 0x0) (async, rerun: 32) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080)={0x10}, 0x10) read$proc_mixer(r1, &(0x7f0000000100)=""/31, 0x1f) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:14:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x2000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000100)) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x7, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000300)={{r5, 0xfffffffffffffffc, 0x7, 0x3, 0x8, 0x8000000000000000, 0x4, 0x7, 0x800, 0x7fff, 0x7fff, 0x4, 0x1, 0x4, 0x200}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x7) 19:14:59 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000340)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000000c0)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000140)={"b45c5e749961ffc9808d256a9636533f", r0, r1, {0xbda9, 0x9}, {0x7}, 0x4, [0x2, 0x7, 0x6, 0x1000, 0xfffffffffffffff7, 0x1, 0x4, 0x40, 0x8, 0x2, 0x100, 0x1, 0x38, 0x1, 0x8, 0x6]}) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r3}}, 0x38) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x42, 0x6, 0x0, {0x6, 0x1, 0x19, 0x0, '/sys/fs/smackfs/ipv6host\x00'}}, 0x42) 19:14:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x106, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) (async) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x42, 0x6, 0x0, {0x6, 0x1, 0x19, 0x0, '/sys/fs/smackfs/ipv6host\x00'}}, 0x42) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x42, 0x6, 0x0, {0x6, 0x1, 0x19, 0x0, '/sys/fs/smackfs/ipv6host\x00'}}, 0x42) (async) 19:14:59 executing program 5: r0 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000340)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000b00)={{r3, 0x8, 0x9, 0x8, 0x7fffffffffffffff, 0x97, 0x1, 0x2, 0x83, 0x5, 0x9, 0x91, 0x5, 0xffffffffe8a16dac, 0x3}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) r6 = syz_io_uring_setup(0x5d64, &(0x7f00000008c0), &(0x7f0000000940), &(0x7f0000000980)) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000ac0)={0x2, 0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000009c0)=""/53, 0x35}, {0x0}], &(0x7f0000000a80)=[0x0, 0xffffffffffffff01]}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r5}}, 0x38) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r7, &(0x7f0000000180)={0x45, 0x6, 0x0, {0x5, 0x0, 0x1c, 0x0, '/sys/fs/smackfs/change-rule\x00'}}, 0x45) 19:14:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) r4 = io_uring_setup(0xbcb, &(0x7f00000002c0)={0x0, 0x62dd, 0x800, 0x3, 0x189, 0x0, r3}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, 0x0) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f00000003c0)={0x1000, 0x0, &(0x7f0000000380)=[r2, r5, r2, r6, r7, r8, r2, r9]}, 0x8) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x22dc0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000280)={0x101, 0x0, &(0x7f0000000240)=[r2, r3, r0, r0, r10]}, 0x5) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000400)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) getdents64(r12, &(0x7f0000000440)=""/239, 0xef) write$RDMA_USER_CM_CMD_CONNECT(r11, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x4, 0x81, "b600a42d1f8cd06be0cb472d9cc6db0cd2789b90eda1835f532d51c06410ca897d9dfc3c4ce22171d6fe96c24a5a2c1014a9f099c62b591c1265ccfa746f0cfe2031fc9240328388bd4846315892e73be75a3387e3c068bd23a9693f66e8edabb947c44f23f2e541ffa2c12a2b7d9e3612f48332c2ab834677b07bdf69c267d2228df2bf4608ef90d49cb63859c0f4dc462746b8aceb2385d442c2d5fffdab15f7d14934485eff1c24da353b2c5a8ea46d089274d577da1988c59e276fcc9cf5c1ebe8a16f900fad63c6cfd2977c24604d8e08f3b42b9ef3d3912a82f6f4f19c74a7cc635eb091019e8ac726443c4b92490a5ede7f1345a02050db0c7cb1b312", 0x7, 0x6, 0x6, 0xcb, 0x5, 0x5, 0x4, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:14:59 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000100)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000100)) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x7, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x7, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000300)={{r5, 0xfffffffffffffffc, 0x7, 0x3, 0x8, 0x8000000000000000, 0x4, 0x7, 0x800, 0x7fff, 0x7fff, 0x4, 0x1, 0x4, 0x200}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x7) (async) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x7) 19:14:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000100)) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x7, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000300)={{r5, 0xfffffffffffffffc, 0x7, 0x3, 0x8, 0x8000000000000000, 0x4, 0x7, 0x800, 0x7fff, 0x7fff, 0x4, 0x1, 0x4, 0x200}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000100)) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x7, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000300)={{r5, 0xfffffffffffffffc, 0x7, 0x3, 0x8, 0x8000000000000000, 0x4, 0x7, 0x800, 0x7fff, 0x7fff, 0x4, 0x1, 0x4, 0x200}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x7) (async) 19:14:59 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:14:59 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async, rerun: 32) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x42, 0x6, 0x0, {0x6, 0x1, 0x19, 0x0, '/sys/fs/smackfs/ipv6host\x00'}}, 0x42) (rerun: 32) 19:14:59 executing program 5: r0 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000340)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000340)={0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000b00)={{r3, 0x8, 0x9, 0x8, 0x7fffffffffffffff, 0x97, 0x1, 0x2, 0x83, 0x5, 0x9, 0x91, 0x5, 0xffffffffe8a16dac, 0x3}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) r6 = syz_io_uring_setup(0x5d64, &(0x7f00000008c0), &(0x7f0000000940), &(0x7f0000000980)) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000ac0)={0x2, 0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000009c0)=""/53, 0x35}, {0x0}], &(0x7f0000000a80)=[0x0, 0xffffffffffffff01]}, 0x20) (async) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000ac0)={0x2, 0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000009c0)=""/53, 0x35}, {0x0}], &(0x7f0000000a80)=[0x0, 0xffffffffffffff01]}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r5}}, 0x38) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r7, &(0x7f0000000180)={0x45, 0x6, 0x0, {0x5, 0x0, 0x1c, 0x0, '/sys/fs/smackfs/change-rule\x00'}}, 0x45) (async) write$FUSE_NOTIFY_DELETE(r7, &(0x7f0000000180)={0x45, 0x6, 0x0, {0x5, 0x0, 0x1c, 0x0, '/sys/fs/smackfs/change-rule\x00'}}, 0x45) 19:14:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x17}}, 0x10) 19:15:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) r4 = io_uring_setup(0xbcb, &(0x7f00000002c0)={0x0, 0x62dd, 0x800, 0x3, 0x189, 0x0, r3}) (async) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) (async) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, 0x0) (async) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f00000003c0)={0x1000, 0x0, &(0x7f0000000380)=[r2, r5, r2, r6, r7, r8, r2, r9]}, 0x8) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x22dc0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000280)={0x101, 0x0, &(0x7f0000000240)=[r2, r3, r0, r0, r10]}, 0x5) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000400)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) getdents64(r12, &(0x7f0000000440)=""/239, 0xef) (async) write$RDMA_USER_CM_CMD_CONNECT(r11, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x4, 0x81, "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", 0x7, 0x6, 0x6, 0xcb, 0x5, 0x5, 0x4, 0x1}}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:00 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000200)=[{0xf7, 0x7, 0x0, 0x1, @tick=0x8, {0x40, 0x1b}, {0xff, 0xab}, @addr={0xff}}, {0xff, 0x40, 0x80, 0x9a, @tick, {0x3, 0x20}, {0x3, 0x80}, @connect={{0x0, 0xf9}, {0x6, 0x7}}}, {0x7, 0x3, 0x1, 0x7e, @tick=0x6, {0x2, 0x9}, {0x20, 0x80}, @queue={0x8, {0x6, 0x1}}}, {0x2c, 0x5, 0x0, 0xfc, @tick=0x9, {0x20, 0x8}, {0x2f, 0x13}, @raw8={"c9abdaad3676bb15a4a82d3a"}}], 0x70) read$ptp(r0, &(0x7f0000000100)=""/221, 0xdd) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) getdents64(r0, &(0x7f0000000080)=""/53, 0x35) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa440) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) 19:15:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x17}}, 0x10) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x3b9aca00}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:00 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x0, 0xee00}}, './file0\x00'}) 19:15:00 executing program 5: r0 = openat$smackfs_change_rule(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 64) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000340)={0x0}) (rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000b00)={{r3, 0x8, 0x9, 0x8, 0x7fffffffffffffff, 0x97, 0x1, 0x2, 0x83, 0x5, 0x9, 0x91, 0x5, 0xffffffffe8a16dac, 0x3}}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) (async, rerun: 64) r6 = syz_io_uring_setup(0x5d64, &(0x7f00000008c0), &(0x7f0000000940), &(0x7f0000000980)) (rerun: 64) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000000ac0)={0x2, 0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000009c0)=""/53, 0x35}, {0x0}], &(0x7f0000000a80)=[0x0, 0xffffffffffffff01]}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r5}}, 0x38) (async) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r7, &(0x7f0000000180)={0x45, 0x6, 0x0, {0x5, 0x0, 0x1c, 0x0, '/sys/fs/smackfs/change-rule\x00'}}, 0x45) 19:15:00 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000200)=[{0xf7, 0x7, 0x0, 0x1, @tick=0x8, {0x40, 0x1b}, {0xff, 0xab}, @addr={0xff}}, {0xff, 0x40, 0x80, 0x9a, @tick, {0x3, 0x20}, {0x3, 0x80}, @connect={{0x0, 0xf9}, {0x6, 0x7}}}, {0x7, 0x3, 0x1, 0x7e, @tick=0x6, {0x2, 0x9}, {0x20, 0x80}, @queue={0x8, {0x6, 0x1}}}, {0x2c, 0x5, 0x0, 0xfc, @tick=0x9, {0x20, 0x8}, {0x2f, 0x13}, @raw8={"c9abdaad3676bb15a4a82d3a"}}], 0x70) read$ptp(r0, &(0x7f0000000100)=""/221, 0xdd) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) getdents64(r0, &(0x7f0000000080)=""/53, 0x35) (async) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa440) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) 19:15:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) r4 = io_uring_setup(0xbcb, &(0x7f00000002c0)={0x0, 0x62dd, 0x800, 0x3, 0x189, 0x0, r3}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, 0x0) (async, rerun: 32) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (rerun: 32) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f00000003c0)={0x1000, 0x0, &(0x7f0000000380)=[r2, r5, r2, r6, r7, r8, r2, r9]}, 0x8) (async, rerun: 64) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x22dc0, 0x0) (rerun: 64) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000280)={0x101, 0x0, &(0x7f0000000240)=[r2, r3, r0, r0, r10]}, 0x5) (async) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000400)={{0x1, 0x1, 0x18, r7, {0x1}}, './file0\x00'}) getdents64(r12, &(0x7f0000000440)=""/239, 0xef) (async, rerun: 64) write$RDMA_USER_CM_CMD_CONNECT(r11, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x4, 0x81, "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", 0x7, 0x6, 0x6, 0xcb, 0x5, 0x5, 0x4, 0x1}}}, 0x120) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0xca9a3b00000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:00 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x0, 0xee00}}, './file0\x00'}) (rerun: 64) 19:15:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x17}}, 0x10) 19:15:00 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000200)=[{0xf7, 0x7, 0x0, 0x1, @tick=0x8, {0x40, 0x1b}, {0xff, 0xab}, @addr={0xff}}, {0xff, 0x40, 0x80, 0x9a, @tick, {0x3, 0x20}, {0x3, 0x80}, @connect={{0x0, 0xf9}, {0x6, 0x7}}}, {0x7, 0x3, 0x1, 0x7e, @tick=0x6, {0x2, 0x9}, {0x20, 0x80}, @queue={0x8, {0x6, 0x1}}}, {0x2c, 0x5, 0x0, 0xfc, @tick=0x9, {0x20, 0x8}, {0x2f, 0x13}, @raw8={"c9abdaad3676bb15a4a82d3a"}}], 0x70) read$ptp(r0, &(0x7f0000000100)=""/221, 0xdd) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) getdents64(r0, &(0x7f0000000080)=""/53, 0x35) (async) getdents64(r0, &(0x7f0000000080)=""/53, 0x35) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) (async) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x1}}, 0x18) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa440) (async) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0xa440) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x200000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:00 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x0, 0xee00}}, './file0\x00'}) 19:15:00 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x109500) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0xfffffffffffffffe, r2, {{0x0, 0x5, 0x0, 0x2, 0x40, 0xfaa, 0x2, 0x40}}}, 0x60) openat$snapshot(0xffffffffffffff9c, &(0x7f0000002140), 0x10200, 0x0) 19:15:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x74eca34, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:00 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x109500) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0xfffffffffffffffe, r2, {{0x0, 0x5, 0x0, 0x2, 0x40, 0xfaa, 0x2, 0x40}}}, 0x60) openat$snapshot(0xffffffffffffff9c, &(0x7f0000002140), 0x10200, 0x0) 19:15:00 executing program 4: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x1) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) 19:15:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x74eca34, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) 19:15:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r2, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000280)={0x100, 0x0, &(0x7f0000000240)=[r3, r1, r0]}, 0x3) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1000) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:00 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000140)=""/259, 0x103) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="96726f6f746d6f66653d"], 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$USERIO_CMD_REGISTER(r3, &(0x7f00000000c0)={0x0, 0xed}, 0x2) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x2, @loopback}, r4}}, 0x38) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x74eca34, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) 19:15:00 executing program 4: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x1) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:00 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x109500) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0xfffffffffffffffe, r2, {{0x0, 0x5, 0x0, 0x2, 0x40, 0xfaa, 0x2, 0x40}}}, 0x60) openat$snapshot(0xffffffffffffff9c, &(0x7f0000002140), 0x10200, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x109500) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0xfffffffffffffffe, r2, {{0x0, 0x5, 0x0, 0x2, 0x40, 0xfaa, 0x2, 0x40}}}, 0x60) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f0000002140), 0x10200, 0x0) (async) 19:15:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r2, 0x6}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) (async) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000280)={0x100, 0x0, &(0x7f0000000240)=[r3, r1, r0]}, 0x3) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1000) 19:15:00 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000140)=""/259, 0x103) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="96726f6f746d6f66653d"], 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) write$USERIO_CMD_REGISTER(r3, &(0x7f00000000c0)={0x0, 0xed}, 0x2) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x2, @loopback}, r4}}, 0x38) 19:15:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x141001, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x2c4c, 0x2, 0x7, 0x0, 0x2, 0x9, 0x5a0, 0x14000000, 0x1, 0x9, 0x6, 0x80000000, 0x401}}) 19:15:00 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) [ 1495.461751][T14520] fuse: Unknown parameter '–rootmofe' 19:15:00 executing program 4: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x1) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) 19:15:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r2, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x6}}, 0x20) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000280)={0x100, 0x0, &(0x7f0000000240)=[r3, r1, r0]}, 0x3) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000280)={0x100, 0x0, &(0x7f0000000240)=[r3, r1, r0]}, 0x3) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1000) 19:15:00 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000c66cb480ec989efdeed3a8da8fa2931e2cf99556e9a43f2defbf8b56532ffd87259192e006c311ee7b88e79650d8b541ea7a24bb196d710f908cac235e658aea68deb544d4026a3ba2578744f51a4fe5b43954972b6afab6d2206254d91ed8ee36f0dac6ca32cc03afcc34dcbd0035ce38be4ca0fbeb2a11b7b426ee75feedac484ebb53720571c38bd3750caf6f7dfb93e622198d30666b3a3439f704566aa5a8c6", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0), 0x488280, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000140)={0xffff, 0x0, &(0x7f0000000100)=[r1, r2, r3, r4, 0xffffffffffffffff, r5]}, 0x6) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:01 executing program 5: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) r1 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) (async, rerun: 64) getdents(0xffffffffffffffff, &(0x7f0000000140)=""/259, 0x103) (rerun: 64) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="96726f6f746d6f66653d"], 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$USERIO_CMD_REGISTER(r3, &(0x7f00000000c0)={0x0, 0xed}, 0x2) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x2, @loopback}, r4}}, 0x38) (rerun: 32) 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000c66cb480ec989efdeed3a8da8fa2931e2cf99556e9a43f2defbf8b56532ffd87259192e006c311ee7b88e79650d8b541ea7a24bb196d710f908cac235e658aea68deb544d4026a3ba2578744f51a4fe5b43954972b6afab6d2206254d91ed8ee36f0dac6ca32cc03afcc34dcbd0035ce38be4ca0fbeb2a11b7b426ee75feedac484ebb53720571c38bd3750caf6f7dfb93e622198d30666b3a3439f704566aa5a8c6", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 1495.583114][T14536] fuse: Unknown parameter '–rootmofe' [ 1495.609719][T14543] adf_ctl_ioctl: 14 callbacks suppressed [ 1495.609736][T14543] QAT: Invalid ioctl -805268463 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x141001, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x2c4c, 0x2, 0x7, 0x0, 0x2, 0x9, 0x5a0, 0x14000000, 0x1, 0x9, 0x6, 0x80000000, 0x401}}) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) (async, rerun: 32) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 64) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0), 0x488280, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000140)={0xffff, 0x0, &(0x7f0000000100)=[r1, r2, r3, r4, 0xffffffffffffffff, r5]}, 0x6) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000c66cb480ec989efdeed3a8da8fa2931e2cf99556e9a43f2defbf8b56532ffd87259192e006c311ee7b88e79650d8b541ea7a24bb196d710f908cac235e658aea68deb544d4026a3ba2578744f51a4fe5b43954972b6afab6d2206254d91ed8ee36f0dac6ca32cc03afcc34dcbd0035ce38be4ca0fbeb2a11b7b426ee75feedac484ebb53720571c38bd3750caf6f7dfb93e622198d30666b3a3439f704566aa5a8c6", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 19:15:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@obj_role={'obj_role', 0x3d, '):#$\\&!}'}}, {@fsmagic={'fsmagic', 0x3d, 0x13e}}, {@obj_user={'obj_user', 0x3d, '\\'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}, {@context={'context', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_measure}]}}, 0x1, 0x0, &(0x7f0000000240)="7ce800ff2f5f122a46f223611dce3a3f1bc7418c20cbceb8460b4d051473b85fb77fc792d1ed5f238e62c6df6437f5325b213ce9c1a98e57d2edb3b2c519f3ee") write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:01 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 1495.798918][T14563] QAT: Invalid ioctl -805268463 19:15:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x141001, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x2c4c, 0x2, 0x7, 0x0, 0x2, 0x9, 0x5a0, 0x14000000, 0x1, 0x9, 0x6, 0x80000000, 0x401}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x141001, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x1f, 0x2c4c, 0x2, 0x7, 0x0, 0x2, 0x9, 0x5a0, 0x14000000, 0x1, 0x9, 0x6, 0x80000000, 0x401}}) (async) 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000000)="ddd50f1fafb609326137ddeb224a0542e66bd872773548", 0x17) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0), 0x488280, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000140)={0xffff, 0x0, &(0x7f0000000100)=[r1, r2, r3, r4, 0xffffffffffffffff, r5]}, 0x6) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@obj_role={'obj_role', 0x3d, '):#$\\&!}'}}, {@fsmagic={'fsmagic', 0x3d, 0x13e}}, {@obj_user={'obj_user', 0x3d, '\\'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}, {@context={'context', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_measure}]}}, 0x1, 0x0, &(0x7f0000000240)="7ce800ff2f5f122a46f223611dce3a3f1bc7418c20cbceb8460b4d051473b85fb77fc792d1ed5f238e62c6df6437f5325b213ce9c1a98e57d2edb3b2c519f3ee") (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) [ 1495.913027][T14576] fuse: Bad value for 'user_id' [ 1495.925286][T14580] QAT: Invalid ioctl -805268463 [ 1495.936466][T14580] QAT: Invalid ioctl -805268463 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000000)="ddd50f1fafb609326137ddeb224a0542e66bd872773548", 0x17) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0xca9a3b}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"f5df3730df50fb05ab623228bc0c3b52", 0x0, 0x0, {0x4e6a, 0x81}, {0x7fffffff, 0x5}, 0x6, [0x1, 0x4, 0xf625, 0x9, 0x94e, 0x9, 0x1, 0x7f, 0xffff, 0x9, 0x7, 0x4, 0x7, 0x9, 0x7fff, 0x3]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000340)={"847f5acd2e72cad927972298d4659fd3", 0x0, r2, {0x3ff}, {0x6, 0x6}, 0x5, [0x7, 0x80, 0x2, 0x9, 0x1, 0xffffffff7fffffff, 0x1, 0xfffffffef7ffffff, 0x7f, 0xb7, 0x4be, 0x10001, 0x296, 0x6, 0x8]}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x3, "cd212139a0013bbdff2a091e974a5ca24c48ddd8416467ccd30c718430943db8a0a34475fa6be733243499f34fdc341babd6bdc4c0096c9f5f3b7f9492bb6ed289c1fefbabe0e45abb3e7c06c98e9f5e8b2298ca507ad0fc0911363d3d24027aac457836db9de3b1a21f90f3728c2820b5f3efc26b59e32109e3f12970889107aabcea4b7e92508e9acf4d7524607189c566a49297ee320e21b3b31307d3703c6faa7c1a46a0d80a0b7bc88bb76dd466a3f0c560ac6ea7b2c1e3e7d9425f7f99b82ba25b15b2972f0768e06c04ba8549dd6215c6813039921585924162ac41b778315baada070d83934265311ee95fec607673350ce9d4a0a4f3519fe1e6183c", 0xe, 0x7, 0x3, 0xff, 0x9, 0x40}, r3}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x80441, 0x0) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 1496.048212][T14590] fuse: Bad value for 'user_id' 19:15:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000000)="ddd50f1fafb609326137ddeb224a0542e66bd872773548", 0x17) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"f5df3730df50fb05ab623228bc0c3b52", 0x0, 0x0, {0x4e6a, 0x81}, {0x7fffffff, 0x5}, 0x6, [0x1, 0x4, 0xf625, 0x9, 0x94e, 0x9, 0x1, 0x7f, 0xffff, 0x9, 0x7, 0x4, 0x7, 0x9, 0x7fff, 0x3]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000340)={"847f5acd2e72cad927972298d4659fd3", 0x0, r2, {0x3ff}, {0x6, 0x6}, 0x5, [0x7, 0x80, 0x2, 0x9, 0x1, 0xffffffff7fffffff, 0x1, 0xfffffffef7ffffff, 0x7f, 0xb7, 0x4be, 0x10001, 0x296, 0x6, 0x8]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x3, "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", 0xe, 0x7, 0x3, 0xff, 0x9, 0x40}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x80441, 0x0) 19:15:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async, rerun: 32) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) (rerun: 32) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x4, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@obj_role={'obj_role', 0x3d, '):#$\\&!}'}}, {@fsmagic={'fsmagic', 0x3d, 0x13e}}, {@obj_user={'obj_user', 0x3d, '\\'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}, {@context={'context', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_measure}]}}, 0x1, 0x0, &(0x7f0000000240)="7ce800ff2f5f122a46f223611dce3a3f1bc7418c20cbceb8460b4d051473b85fb77fc792d1ed5f238e62c6df6437f5325b213ce9c1a98e57d2edb3b2c519f3ee") write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 1496.207361][T14610] fuse: Bad value for 'fd' 19:15:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"f5df3730df50fb05ab623228bc0c3b52", 0x0, 0x0, {0x4e6a, 0x81}, {0x7fffffff, 0x5}, 0x6, [0x1, 0x4, 0xf625, 0x9, 0x94e, 0x9, 0x1, 0x7f, 0xffff, 0x9, 0x7, 0x4, 0x7, 0x9, 0x7fff, 0x3]}) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"f5df3730df50fb05ab623228bc0c3b52", 0x0, 0x0, {0x4e6a, 0x81}, {0x7fffffff, 0x5}, 0x6, [0x1, 0x4, 0xf625, 0x9, 0x94e, 0x9, 0x1, 0x7f, 0xffff, 0x9, 0x7, 0x4, 0x7, 0x9, 0x7fff, 0x3]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000340)={"847f5acd2e72cad927972298d4659fd3", 0x0, r2, {0x3ff}, {0x6, 0x6}, 0x5, [0x7, 0x80, 0x2, 0x9, 0x1, 0xffffffff7fffffff, 0x1, 0xfffffffef7ffffff, 0x7f, 0xb7, 0x4be, 0x10001, 0x296, 0x6, 0x8]}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x3, "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", 0xe, 0x7, 0x3, 0xff, 0x9, 0x40}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x3, "cd212139a0013bbdff2a091e974a5ca24c48ddd8416467ccd30c718430943db8a0a34475fa6be733243499f34fdc341babd6bdc4c0096c9f5f3b7f9492bb6ed289c1fefbabe0e45abb3e7c06c98e9f5e8b2298ca507ad0fc0911363d3d24027aac457836db9de3b1a21f90f3728c2820b5f3efc26b59e32109e3f12970889107aabcea4b7e92508e9acf4d7524607189c566a49297ee320e21b3b31307d3703c6faa7c1a46a0d80a0b7bc88bb76dd466a3f0c560ac6ea7b2c1e3e7d9425f7f99b82ba25b15b2972f0768e06c04ba8549dd6215c6813039921585924162ac41b778315baada070d83934265311ee95fec607673350ce9d4a0a4f3519fe1e6183c", 0xe, 0x7, 0x3, 0xff, 0x9, 0x40}, r3}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440), 0x80441, 0x0) 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$vhost_msg(0xffffffffffffffff, &(0x7f0000000100)={0x1, {&(0x7f0000000000)=""/82, 0x52, &(0x7f0000000080)=""/8, 0x2, 0x3}}, 0x48) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, r2}}, 0x38) 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x1}}, 0x20) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$vhost_msg(0xffffffffffffffff, &(0x7f0000000100)={0x1, {&(0x7f0000000000)=""/82, 0x52, &(0x7f0000000080)=""/8, 0x2, 0x3}}, 0x48) (async) write$vhost_msg(0xffffffffffffffff, &(0x7f0000000100)={0x1, {&(0x7f0000000000)=""/82, 0x52, &(0x7f0000000080)=""/8, 0x2, 0x3}}, 0x48) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000240)={0xffffffffffffffff}, 0x1, r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0xfffc0000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x100, 0xffffff36, "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", 0x8, 0x40, 0x3, 0x0, 0xa3, 0x26, 0x4, 0x1}, r3}}, 0x128) 19:15:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x1}}, 0x20) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x4, 0xfffffffffffffffe, 0x8000000000000001, 0x3, 0x991, 0x175f, 0x81, 0x400}}}, 0x60) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xc0041, 0x0) 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, r2}}, 0x38) 19:15:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x1}}, 0x20) 19:15:01 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$vhost_msg(0xffffffffffffffff, &(0x7f0000000100)={0x1, {&(0x7f0000000000)=""/82, 0x52, &(0x7f0000000080)=""/8, 0x2, 0x3}}, 0x48) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) write$vhost_msg(0xffffffffffffffff, &(0x7f0000000100)={0x1, {&(0x7f0000000000)=""/82, 0x52, &(0x7f0000000080)=""/8, 0x2, 0x3}}, 0x48) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:01 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:01 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x4, 0xfffffffffffffffe, 0x8000000000000001, 0x3, 0x991, 0x175f, 0x81, 0x400}}}, 0x60) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xc0041, 0x0) 19:15:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, r2}}, 0x38) 19:15:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000240)={0xffffffffffffffff}, 0x1, r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0xfffc0000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x100, 0xffffff36, "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", 0x8, 0x40, 0x3, 0x0, 0xa3, 0x26, 0x4, 0x1}, r3}}, 0x128) 19:15:02 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x100844, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x401}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@audit}, {@obj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x1a, 0x36, 0x61, 0x65, 0x34, 0x62, 0x37], 0x2d, [0x0, 0x33, 0x66, 0x63], 0x2d, [0x31, 0x65, 0x39, 0x36], 0x2d, [0x62, 0x63, 0x32, 0x36], 0x2d, [0x64, 0x62, 0x37, 0x61, 0x62, 0x61, 0x36, 0x31]}}}, {@appraise_type}, {@dont_appraise}, {@context={'context', 0x3d, 'unconfined_u'}}]}}, 0x0, 0x0, &(0x7f0000000280)="d6f7cc4ae60faeadf36bbc3d0ca701bd8b88159b4b03afd1d3dcd6375fbd282feaae1bb54df0145162fecda5e1167500547fcbde44fc7c3b5709e8b209c6e679c4") statx(r1, &(0x7f0000000300)='./file0\x00', 0x6000, 0x1, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x1}}, 0xffffffffffffff27) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x3b9aca00}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x4f6242) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r2, 0xe, &(0x7f0000001800)={0x10000, 0x0, &(0x7f0000001700)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/203, 0xcb}, {&(0x7f0000000040)=""/3, 0x3}, {&(0x7f0000001340)=""/251, 0xfb}, {&(0x7f0000000240)=""/132, 0x84}, {&(0x7f0000001440)=""/245, 0xf5}, {&(0x7f00000000c0)=""/31, 0x1f}, {&(0x7f0000001540)=""/194, 0xc2}, {&(0x7f0000001640)=""/182, 0xb6}], &(0x7f00000017c0)=[0x3], 0x9}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000240)={0xffffffffffffffff}, 0x1, r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0xfffc0000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x100, 0xffffff36, "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", 0x8, 0x40, 0x3, 0x0, 0xa3, 0x26, 0x4, 0x1}, r3}}, 0x128) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x4f6242) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:02 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x4, 0xfffffffffffffffe, 0x8000000000000001, 0x3, 0x991, 0x175f, 0x81, 0x400}}}, 0x60) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xc0041, 0x0) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0xca9a3b00000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async, rerun: 32) r1 = syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x100844, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x401}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@audit}, {@obj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x1a, 0x36, 0x61, 0x65, 0x34, 0x62, 0x37], 0x2d, [0x0, 0x33, 0x66, 0x63], 0x2d, [0x31, 0x65, 0x39, 0x36], 0x2d, [0x62, 0x63, 0x32, 0x36], 0x2d, [0x64, 0x62, 0x37, 0x61, 0x62, 0x61, 0x36, 0x31]}}}, {@appraise_type}, {@dont_appraise}, {@context={'context', 0x3d, 'unconfined_u'}}]}}, 0x0, 0x0, &(0x7f0000000280)="d6f7cc4ae60faeadf36bbc3d0ca701bd8b88159b4b03afd1d3dcd6375fbd282feaae1bb54df0145162fecda5e1167500547fcbde44fc7c3b5709e8b209c6e679c4") (rerun: 32) statx(r1, &(0x7f0000000300)='./file0\x00', 0x6000, 0x1, &(0x7f0000000340)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x1}}, 0xffffffffffffff27) 19:15:02 executing program 2: write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8}, 0x10) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8a2c, 0xe51, "2f15f3acbf723126eca29071afbb2d7478d55368c0cb25a275ed53573de2ee4f1a3e65820db01db72d2c98149b0495e458aab3112c16005c5def31eb24e97c2b56849d2dad81b368d06cf7eac17f41304da4e2b197c4734414bddce5856888f9a94583f4c2046cf5650cba4ef404f800cd89e185af1a81ec05eb2c44532e0e825086c3efe1bef1a411c5084067863ad2626dd7f5f29aecefe0698d82eacd4fafb1d6b3ea378e903a7e3b04ca726632a6106e1c429ca304472445eb927cc2a244c1970a77423e91cc5320ec52e7cb17e91261891846c0482f4957410339fe33946e6e763940d5fbe1d9feb237303480711c04cba592d8a2a8442c8e604fc3f807", 0x3f, 0x9, 0x70, 0x0, 0x6, 0x3f, 0x8, 0x1}, r1}}, 0x120) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x4f6242) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x4f6242) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:02 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r2, 0xe, &(0x7f0000001800)={0x10000, 0x0, &(0x7f0000001700)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/203, 0xcb}, {&(0x7f0000000040)=""/3, 0x3}, {&(0x7f0000001340)=""/251, 0xfb}, {&(0x7f0000000240)=""/132, 0x84}, {&(0x7f0000001440)=""/245, 0xf5}, {&(0x7f00000000c0)=""/31, 0x1f}, {&(0x7f0000001540)=""/194, 0xc2}, {&(0x7f0000001640)=""/182, 0xb6}], &(0x7f00000017c0)=[0x3], 0x9}, 0x20) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r2, 0xe, &(0x7f0000001800)={0x10000, 0x0, &(0x7f0000001700)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/203, 0xcb}, {&(0x7f0000000040)=""/3, 0x3}, {&(0x7f0000001340)=""/251, 0xfb}, {&(0x7f0000000240)=""/132, 0x84}, {&(0x7f0000001440)=""/245, 0xf5}, {&(0x7f00000000c0)=""/31, 0x1f}, {&(0x7f0000001540)=""/194, 0xc2}, {&(0x7f0000001640)=""/182, 0xb6}], &(0x7f00000017c0)=[0x3], 0x9}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4880, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x212401) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:02 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x100844, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x401}}, {@allow_other}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}], [{@audit}, {@obj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x1a, 0x36, 0x61, 0x65, 0x34, 0x62, 0x37], 0x2d, [0x0, 0x33, 0x66, 0x63], 0x2d, [0x31, 0x65, 0x39, 0x36], 0x2d, [0x62, 0x63, 0x32, 0x36], 0x2d, [0x64, 0x62, 0x37, 0x61, 0x62, 0x61, 0x36, 0x31]}}}, {@appraise_type}, {@dont_appraise}, {@context={'context', 0x3d, 'unconfined_u'}}]}}, 0x0, 0x0, &(0x7f0000000280)="d6f7cc4ae60faeadf36bbc3d0ca701bd8b88159b4b03afd1d3dcd6375fbd282feaae1bb54df0145162fecda5e1167500547fcbde44fc7c3b5709e8b209c6e679c4") statx(r1, &(0x7f0000000300)='./file0\x00', 0x6000, 0x1, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0x1}}, 0xffffffffffffff27) 19:15:02 executing program 2: write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8}, 0x10) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8a2c, 0xe51, "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", 0x3f, 0x9, 0x70, 0x0, 0x6, 0x3f, 0x8, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8a2c, 0xe51, "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", 0x3f, 0x9, 0x70, 0x0, 0x6, 0x3f, 0x8, 0x1}, r1}}, 0x120) (async) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r2, 0xe, &(0x7f0000001800)={0x10000, 0x0, &(0x7f0000001700)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/203, 0xcb}, {&(0x7f0000000040)=""/3, 0x3}, {&(0x7f0000001340)=""/251, 0xfb}, {&(0x7f0000000240)=""/132, 0x84}, {&(0x7f0000001440)=""/245, 0xf5}, {&(0x7f00000000c0)=""/31, 0x1f}, {&(0x7f0000001540)=""/194, 0xc2}, {&(0x7f0000001640)=""/182, 0xb6}], &(0x7f00000017c0)=[0x3], 0x9}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:02 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4880, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4880, 0x0) (async) write$smackfs_ipv6host(r2, 0x0, 0xb9) (async) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x212401) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x212401) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8, 0x200, "b59f60642ee355d728a33e94f8ed5441ae707af405e09ccb2e01cae458bd3ded5f1d5cb9fe1daff93e978ef32f3a57c3d9d6585a9208f32ea6b58dad2e8b3c65d37dda22edc32b359e61dfbe2efc545e665acd4da4704a266f1b113a7e69e3967e07081fff6474cef3443edbdcc08439bf4a6323d94aa3bafc77f78acfda86a9551bf278db8ac7f8dea991e76e8441b64b9205227b2593121f2e6bd9385a55b043b14391c269361ee7a1912e6b9721754c41fba208fd218919b6ea7855a679356209d79281291adc2bf07ab3e104898808270fe9377a9274132c137a33fd63b2796b2c6c8dea7fd115f999a73492188edbad59bda2159c5026a64581dcbdb98a", 0x3f, 0x98, 0x80, 0x8, 0x51, 0x9, 0x4, 0x1}}}, 0x120) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(r1, 0xf, &(0x7f0000000700)={0x6, 0x1, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)=""/227, 0xe3}, {&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f0000000440)=""/60, 0x3c}, {&(0x7f0000000480)=""/76, 0x4c}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/88, 0x58}], &(0x7f00000006c0)=[0x6, 0x100000001, 0xd, 0x0]}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) write$capi20_data(r1, &(0x7f0000000740)={{0x10, 0x598, 0x87, 0x82, 0x6, 0x3}, 0x2d, "81995ce803211077bceba3fbd163d563a62116a547ec8f5b2a9bb40a719da1a3a509a16f4a41abebd0c7f2d306"}, 0x3f) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 2: write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8a2c, 0xe51, "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", 0x3f, 0x9, 0x70, 0x0, 0x6, 0x3f, 0x8, 0x1}, r1}}, 0x120) 19:15:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"2b2d5da0a0150feb6b273cbc93ded19b", 0x0, 0x0, {0xf4bb, 0x4}, {0x9, 0x7}, 0x200, [0x1, 0x1000, 0x2, 0x1, 0x80, 0x5, 0x2, 0x5, 0x6, 0x20, 0x8, 0x2, 0x1, 0x7fffffff, 0x7ff, 0xc795]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) 19:15:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8, 0x200, "b59f60642ee355d728a33e94f8ed5441ae707af405e09ccb2e01cae458bd3ded5f1d5cb9fe1daff93e978ef32f3a57c3d9d6585a9208f32ea6b58dad2e8b3c65d37dda22edc32b359e61dfbe2efc545e665acd4da4704a266f1b113a7e69e3967e07081fff6474cef3443edbdcc08439bf4a6323d94aa3bafc77f78acfda86a9551bf278db8ac7f8dea991e76e8441b64b9205227b2593121f2e6bd9385a55b043b14391c269361ee7a1912e6b9721754c41fba208fd218919b6ea7855a679356209d79281291adc2bf07ab3e104898808270fe9377a9274132c137a33fd63b2796b2c6c8dea7fd115f999a73492188edbad59bda2159c5026a64581dcbdb98a", 0x3f, 0x98, 0x80, 0x8, 0x51, 0x9, 0x4, 0x1}}}, 0x120) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(r1, 0xf, &(0x7f0000000700)={0x6, 0x1, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)=""/227, 0xe3}, {&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f0000000440)=""/60, 0x3c}, {&(0x7f0000000480)=""/76, 0x4c}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/88, 0x58}], &(0x7f00000006c0)=[0x6, 0x100000001, 0xd, 0x0]}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) write$capi20_data(r1, &(0x7f0000000740)={{0x10, 0x598, 0x87, 0x82, 0x6, 0x3}, 0x2d, "81995ce803211077bceba3fbd163d563a62116a547ec8f5b2a9bb40a719da1a3a509a16f4a41abebd0c7f2d306"}, 0x3f) 19:15:02 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4880, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x3f, @remote, 0x5}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e24, 0x1ff, @empty, 0x8}}}, 0x38) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x212401) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"2b2d5da0a0150feb6b273cbc93ded19b", 0x0, 0x0, {0xf4bb, 0x4}, {0x9, 0x7}, 0x200, [0x1, 0x1000, 0x2, 0x1, 0x80, 0x5, 0x2, 0x5, 0x6, 0x20, 0x8, 0x2, 0x1, 0x7fffffff, 0x7ff, 0xc795]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"2b2d5da0a0150feb6b273cbc93ded19b", 0x0, 0x0, {0xf4bb, 0x4}, {0x9, 0x7}, 0x200, [0x1, 0x1000, 0x2, 0x1, 0x80, 0x5, 0x2, 0x5, 0x6, 0x20, 0x8, 0x2, 0x1, 0x7fffffff, 0x7ff, 0xc795]}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) (async) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8, 0x200, "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", 0x3f, 0x98, 0x80, 0x8, 0x51, 0x9, 0x4, 0x1}}}, 0x120) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_BUFFERS2(r1, 0xf, &(0x7f0000000700)={0x6, 0x1, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)=""/227, 0xe3}, {&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f0000000440)=""/60, 0x3c}, {&(0x7f0000000480)=""/76, 0x4c}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/88, 0x58}], &(0x7f00000006c0)=[0x6, 0x100000001, 0xd, 0x0]}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) write$capi20_data(r1, &(0x7f0000000740)={{0x10, 0x598, 0x87, 0x82, 0x6, 0x3}, 0x2d, "81995ce803211077bceba3fbd163d563a62116a547ec8f5b2a9bb40a719da1a3a509a16f4a41abebd0c7f2d306"}, 0x3f) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x8, 0x200, "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", 0x3f, 0x98, 0x80, 0x8, 0x51, 0x9, 0x4, 0x1}}}, 0x120) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_BUFFERS2(r1, 0xf, &(0x7f0000000700)={0x6, 0x1, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)=""/227, 0xe3}, {&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f0000000440)=""/60, 0x3c}, {&(0x7f0000000480)=""/76, 0x4c}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/88, 0x58}], &(0x7f00000006c0)=[0x6, 0x100000001, 0xd, 0x0]}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) write$capi20_data(r1, &(0x7f0000000740)={{0x10, 0x598, 0x87, 0x82, 0x6, 0x3}, 0x2d, "81995ce803211077bceba3fbd163d563a62116a547ec8f5b2a9bb40a719da1a3a509a16f4a41abebd0c7f2d306"}, 0x3f) (async) 19:15:02 executing program 4: fstat(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="090000008dde000000402e2f66696c653000"]) 19:15:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"2b2d5da0a0150feb6b273cbc93ded19b", 0x0, 0x0, {0xf4bb, 0x4}, {0x9, 0x7}, 0x200, [0x1, 0x1000, 0x2, 0x1, 0x80, 0x5, 0x2, 0x5, 0x6, 0x20, 0x8, 0x2, 0x1, 0x7fffffff, 0x7ff, 0xc795]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x38) 19:15:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x3f, @remote, 0x5}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e24, 0x1ff, @empty, 0x8}}}, 0x38) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) fstat(r1, &(0x7f0000000000)) 19:15:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100f3ff17000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc4}}) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x3f, @remote, 0x5}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e24, 0x1ff, @empty, 0x8}}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000002c0)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x3, {0xa, 0x4e23, 0x3f, @remote, 0x5}}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x4, {0xa, 0x4e24, 0x1ff, @empty, 0x8}}}, 0x38) (async) 19:15:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:02 executing program 4: fstat(0xffffffffffffffff, &(0x7f0000000000)) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="090000008dde000000402e2f66696c653000"]) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) fstat(r1, &(0x7f0000000000)) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) fstat(r1, &(0x7f0000000000)) (async) 19:15:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100f3ff17000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc4}}) 19:15:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:02 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:02 executing program 4: fstat(0xffffffffffffffff, &(0x7f0000000000)) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="090000008dde000000402e2f66696c653000"]) 19:15:02 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) fstat(r1, &(0x7f0000000000)) 19:15:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) read$FUSE(r3, &(0x7f00000043c0)={0x2020, 0x0, 0x0}, 0xffffffffffffff57) write$FUSE_INIT(r2, &(0x7f0000002100)={0x50, 0x0, r6}, 0x50) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000002180)) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0x0, r6, {{0x3, 0xffff, 0x0, 0x1000, 0x4, 0x4, 0x4, 0x81}}}, 0x60) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000027d27f5e1d2e2f66"]) epoll_wait(r7, &(0x7f00000001c0)=[{}, {}, {}], 0x3, 0x4) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100f3ff17000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc4}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100f3ff17000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc4}}) (async) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:15:03 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 19:15:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) 19:15:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) read$FUSE(r3, &(0x7f00000043c0)={0x2020, 0x0, 0x0}, 0xffffffffffffff57) write$FUSE_INIT(r2, &(0x7f0000002100)={0x50, 0x0, r6}, 0x50) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000002180)) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0x0, r6, {{0x3, 0xffff, 0x0, 0x1000, 0x4, 0x4, 0x4, 0x81}}}, 0x60) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000027d27f5e1d2e2f66"]) (rerun: 32) epoll_wait(r7, &(0x7f00000001c0)=[{}, {}, {}], 0x3, 0x4) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000040), 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:03 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 19:15:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) 19:15:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) read$FUSE(r3, &(0x7f00000043c0)={0x2020, 0x0, 0x0}, 0xffffffffffffff57) write$FUSE_INIT(r2, &(0x7f0000002100)={0x50, 0x0, r6}, 0x50) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000002180)) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0x0, r6, {{0x3, 0xffff, 0x0, 0x1000, 0x4, 0x4, 0x4, 0x81}}}, 0x60) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r4, 0xc0189378, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000027d27f5e1d2e2f66"]) epoll_wait(r7, &(0x7f00000001c0)=[{}, {}, {}], 0x3, 0x4) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000040), 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0xca9a3b}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 19:15:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) 19:15:03 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:15:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x401, {0x2, 0x46, "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", 0x6, 0x2, 0x7, 0xc0, 0x8, 0x1, 0x80}}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 19:15:03 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$smackfs_ptrace(0xffffffffffffffff, &(0x7f0000000040), 0x14) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x1}}, 0x20) 19:15:03 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x48040) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x401, {0x2, 0x46, "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", 0x6, 0x2, 0x7, 0xc0, 0x8, 0x1, 0x80}}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x401, {0x2, 0x46, "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", 0x6, 0x2, 0x7, 0xc0, 0x8, 0x1, 0x80}}}, 0x128) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) (async) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x4e20, 0x8, @remote, 0x800}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x1}}, 0x20) 19:15:03 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async, rerun: 64) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 64) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 19:15:03 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x48040) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x401, {0x2, 0x46, "a9a4bbba449682af1d6728a52a0965c557956a63c87c01d29f9b4770a55699646e4176ee7b37ebdb4a603906519a4659ba522b7db7b61be9d5694ea90a8c54d39ed3b11473109ab4c48894475b8b81b0f349614cb15cba2de89ffe5ff8cf37fcd1e4b95a7925792cc3fef5f62a871cf3ef0fef436cf91e05711832a38758f3daefc69f83ec6c90729078d07198ce7f22d60a9fc0eabf69a5c8a26902f004e157d8c326ab89f16403577b7ba9705ec453bd6c9fc4d8444a40b670ef69485579fa2cebbdec24058de7e103c06585a1df2bf51b56478bd7f760e5248df115bd8410877ae82f7857809c9b77bcccbc2a375443f9a0c54ff1ab75d34d47b0b497f8b5", 0x6, 0x2, 0x7, 0xc0, 0x8, 0x1, 0x80}}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x48040) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:03 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x4e20, 0x8, @remote, 0x800}}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x1}}, 0x20) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x4e20, 0x8, @remote, 0x800}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:03 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000140)={0x2b, 0x4, 0x0, {0x5, 0x7f, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180), 0x4200, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) r7 = openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000240)={0x200, 0x0, &(0x7f0000000200)=[r5, r6, r3, r7]}, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x0, 0xffffffffffffffff}}, './file0\x00'}) 19:15:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x3, {0x1f, 0x6b90b3fc, "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", 0x89, 0x7, 0x20, 0x1d, 0xed, 0x1, 0xe6, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:03 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x3b9aca00}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:03 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$damon_schemes(r1, &(0x7f0000000080)={0xffffffffffffec11, 0xfffffffffffffffd, 0x20, 0x20, 0x51, 0xf, 0x10000}, 0x66) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:03 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) (async) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000140)={0x2b, 0x4, 0x0, {0x5, 0x7f, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180), 0x4200, 0x0) (async) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) (async) r7 = openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000240)={0x200, 0x0, &(0x7f0000000200)=[r5, r6, r3, r7]}, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x0, 0xffffffffffffffff}}, './file0\x00'}) 19:15:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r3, 0xe, &(0x7f0000001580)={0x4, 0x0, &(0x7f0000001480)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/94, 0x5e}, {&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f00000001c0)=""/3, 0x3}, {&(0x7f0000000200)=""/236, 0xec}, {&(0x7f0000001340)=""/30, 0x1e}, {&(0x7f0000001380)=""/126, 0x7e}, {&(0x7f0000001400)=""/3, 0x3}, {&(0x7f0000001440)=""/5, 0x5}], &(0x7f0000001540)=[0x3, 0x81, 0x401, 0x9, 0xca2, 0x4, 0x6], 0x9}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x40000000, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x38) 19:15:03 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x3, {0x1f, 0x6b90b3fc, "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", 0x89, 0x7, 0x20, 0x1d, 0xed, 0x1, 0xe6, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r3, 0xe, &(0x7f0000001580)={0x4, 0x0, &(0x7f0000001480)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/94, 0x5e}, {&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f00000001c0)=""/3, 0x3}, {&(0x7f0000000200)=""/236, 0xec}, {&(0x7f0000001340)=""/30, 0x1e}, {&(0x7f0000001380)=""/126, 0x7e}, {&(0x7f0000001400)=""/3, 0x3}, {&(0x7f0000001440)=""/5, 0x5}], &(0x7f0000001540)=[0x3, 0x81, 0x401, 0x9, 0xca2, 0x4, 0x6], 0x9}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x40000000, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x38) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0xca9a3b00000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$damon_schemes(r1, &(0x7f0000000080)={0xffffffffffffec11, 0xfffffffffffffffd, 0x20, 0x20, 0x51, 0xf, 0x10000}, 0x66) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x3, {0x1f, 0x6b90b3fc, "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", 0x89, 0x7, 0x20, 0x1d, 0xed, 0x1, 0xe6, 0x1}}}, 0x128) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:04 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000140)={0x2b, 0x4, 0x0, {0x5, 0x7f, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180), 0x4200, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) r7 = openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000240)={0x200, 0x0, &(0x7f0000000200)=[r5, r6, r3, r7]}, 0x4) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x0, 0xffffffffffffffff}}, './file0\x00'}) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0xc0100, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) (async) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000140)={0x2b, 0x4, 0x0, {0x5, 0x7f, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000180), 0x4200, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) (async) openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(r4, 0x6, &(0x7f0000000240)={0x200, 0x0, &(0x7f0000000200)=[r5, r6, r3, r7]}, 0x4) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x0, 0xffffffffffffffff}}, './file0\x00'}) (async) 19:15:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r3, 0xe, &(0x7f0000001580)={0x4, 0x0, &(0x7f0000001480)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/94, 0x5e}, {&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f00000001c0)=""/3, 0x3}, {&(0x7f0000000200)=""/236, 0xec}, {&(0x7f0000001340)=""/30, 0x1e}, {&(0x7f0000001380)=""/126, 0x7e}, {&(0x7f0000001400)=""/3, 0x3}, {&(0x7f0000001440)=""/5, 0x5}], &(0x7f0000001540)=[0x3, 0x81, 0x401, 0x9, 0xca2, 0x4, 0x6], 0x9}, 0x20) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x40000000, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r3, 0xe, &(0x7f0000001580)={0x4, 0x0, &(0x7f0000001480)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000140)=""/94, 0x5e}, {&(0x7f00000000c0)=""/25, 0x19}, {&(0x7f00000001c0)=""/3, 0x3}, {&(0x7f0000000200)=""/236, 0xec}, {&(0x7f0000001340)=""/30, 0x1e}, {&(0x7f0000001380)=""/126, 0x7e}, {&(0x7f0000001400)=""/3, 0x3}, {&(0x7f0000001440)=""/5, 0x5}], &(0x7f0000001540)=[0x3, 0x81, 0x401, 0x9, 0xca2, 0x4, 0x6], 0x9}, 0x20) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x40000000, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x38) (async) 19:15:04 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) write$damon_schemes(r1, &(0x7f0000000080)={0xffffffffffffec11, 0xfffffffffffffffd, 0x20, 0x20, 0x51, 0xf, 0x10000}, 0x66) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) r2 = openat$damon_monitor_on(0xffffffffffffff9c, &(0x7f0000000040), 0xc0, 0x61) fstat(r2, &(0x7f0000000140)) 19:15:04 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) write$smackfs_ipv6host(r2, &(0x7f0000000080)=@l1={{0x0, 0x3a, 0x100000000, 0x3a, 0x80, 0x3a, 0x9, 0x3a, 0x40, 0x3a, 0x1, 0x3a, 0x94, 0x3a, 0x4e652e00}, 0x20, '\x81]'}, 0x9b) write$smackfs_ipv6host(r1, 0x0, 0xffffff5a) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) r2 = openat$damon_monitor_on(0xffffffffffffff9c, &(0x7f0000000040), 0xc0, 0x61) fstat(r2, &(0x7f0000000140)) 19:15:04 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) write$smackfs_ipv6host(r2, &(0x7f0000000080)=@l1={{0x0, 0x3a, 0x100000000, 0x3a, 0x80, 0x3a, 0x9, 0x3a, 0x40, 0x3a, 0x1, 0x3a, 0x94, 0x3a, 0x4e652e00}, 0x20, '\x81]'}, 0x9b) write$smackfs_ipv6host(r1, 0x0, 0xffffff5a) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) (async) write$smackfs_ipv6host(r2, &(0x7f0000000080)=@l1={{0x0, 0x3a, 0x100000000, 0x3a, 0x80, 0x3a, 0x9, 0x3a, 0x40, 0x3a, 0x1, 0x3a, 0x94, 0x3a, 0x4e652e00}, 0x20, '\x81]'}, 0x9b) (async) write$smackfs_ipv6host(r1, 0x0, 0xffffff5a) (async) 19:15:04 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) (async) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:04 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) write$smackfs_ipv6host(r2, &(0x7f0000000080)=@l1={{0x0, 0x3a, 0x100000000, 0x3a, 0x80, 0x3a, 0x9, 0x3a, 0x40, 0x3a, 0x1, 0x3a, 0x94, 0x3a, 0x4e652e00}, 0x20, '\x81]'}, 0x9b) (async) write$smackfs_ipv6host(r1, 0x0, 0xffffff5a) 19:15:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) r2 = openat$damon_monitor_on(0xffffffffffffff9c, &(0x7f0000000040), 0xc0, 0x61) fstat(r2, &(0x7f0000000140)) 19:15:04 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) read$FUSE(r1, &(0x7f0000001d40)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xee01, r2}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000040)={0xa0, 0x0, 0x0, {{0x0, 0x3, 0x3, 0xd697, 0x8, 0x1ff, {0x5, 0x4, 0x10001, 0x2, 0xa, 0x1, 0x1, 0x8000, 0x2, 0x6000, 0x1ff, 0xffffffffffffffff, 0xee00, 0x3, 0x1}}, {0x0, 0x3}}}, 0xa0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0xffffffffffffffff, 0x0}}, 0x20) 19:15:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000200)=""/98, 0x62) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file1\x00'}) r4 = io_uring_setup(0x1711, &(0x7f0000000180)={0x0, 0x6f24, 0x8, 0x0, 0x3a4, 0x0, r3}) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0x5450, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:04 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x50002, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x404f40) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) read$FUSE(r1, &(0x7f0000001d40)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xee01, r2}}, './file0\x00'}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000040)={0xa0, 0x0, 0x0, {{0x0, 0x3, 0x3, 0xd697, 0x8, 0x1ff, {0x5, 0x4, 0x10001, 0x2, 0xa, 0x1, 0x1, 0x8000, 0x2, 0x6000, 0x1ff, 0xffffffffffffffff, 0xee00, 0x3, 0x1}}, {0x0, 0x3}}}, 0xa0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0xffffffffffffffff, 0x0}}, 0x20) 19:15:04 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) read$FUSE(r1, &(0x7f0000001d40)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000001d40)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xee01, r2}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000040)={0xa0, 0x0, 0x0, {{0x0, 0x3, 0x3, 0xd697, 0x8, 0x1ff, {0x5, 0x4, 0x10001, 0x2, 0xa, 0x1, 0x1, 0x8000, 0x2, 0x6000, 0x1ff, 0xffffffffffffffff, 0xee00, 0x3, 0x1}}, {0x0, 0x3}}}, 0xa0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:04 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x50002, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x404f40) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x50002, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x404f40) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) (async) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000200)=""/98, 0x62) (async) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000200)=""/98, 0x62) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file1\x00'}) r4 = io_uring_setup(0x1711, &(0x7f0000000180)={0x0, 0x6f24, 0x8, 0x0, 0x3a4, 0x0, r3}) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0x5450, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {r0}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0xffffffffffffffff, 0x0}}, 0x20) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='[\x00'/16]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:04 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x50002, 0x0) (async, rerun: 64) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x404f40) (rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) 19:15:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) read$proc_mixer(0xffffffffffffffff, &(0x7f0000000200)=""/98, 0x62) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file1\x00'}) r4 = io_uring_setup(0x1711, &(0x7f0000000180)={0x0, 0x6f24, 0x8, 0x0, 0x3a4, 0x0, r3}) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0x5450, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:04 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:04 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='[\x00'/16]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='[\x00'/16]) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:05 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:05 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:05 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0x4, 0x9, "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", 0x3, 0x6, 0x3, 0x2, 0xff, 0x4a, 0x6}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='[\x00'/16]) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='[\x00'/16]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:05 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) clock_gettime(0x6, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000010000001800000001aebac0129101eb2bd04a3ee04489b23b76e4d1fb6f6669ea9c172f957e3b295ee6cb582a686b2d42ea8609f510e8328174d451e2fe", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0000afe1f254658a586410e091"]) 19:15:05 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) clock_gettime(0x6, &(0x7f00000000c0)) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000010000001800000001aebac0129101eb2bd04a3ee04489b23b76e4d1fb6f6669ea9c172f957e3b295ee6cb582a686b2d42ea8609f510e8328174d451e2fe", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0000afe1f254658a586410e091"]) (rerun: 32) 19:15:05 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80000) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:05 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:05 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0x4, 0x9, "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", 0x3, 0x6, 0x3, 0x2, 0xff, 0x4a, 0x6}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x7fff, 0x3f, {"881036dde8727e02ebd3fc86ec301edb"}, 0x1, 0xfff, 0xffffffffffffffff}}}, 0xa0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000003c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x2c39, 0x7, "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", 0x7, 0x80, 0x95, 0x2, 0xf8, 0x7f, 0x20}, r4}}, 0x120) 19:15:05 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) clock_gettime(0x6, &(0x7f00000000c0)) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000010000001800000001aebac0129101eb2bd04a3ee04489b23b76e4d1fb6f6669ea9c172f957e3b295ee6cb582a686b2d42ea8609f510e8328174d451e2fe", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0000afe1f254658a586410e091"]) 19:15:05 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:05 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:05 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f, 0x2}}, 0x20) 19:15:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0x4, 0x9, "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", 0x3, 0x6, 0x3, 0x2, 0xff, 0x4a, 0x6}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x7fff, 0x3f, {"881036dde8727e02ebd3fc86ec301edb"}, 0x1, 0xfff, 0xffffffffffffffff}}}, 0xa0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) (async) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000003c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x2c39, 0x7, "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", 0x7, 0x80, 0x95, 0x2, 0xf8, 0x7f, 0x20}, r4}}, 0x120) 19:15:05 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:05 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000300)=ANY=[@ANYBLOB="0100010001285800180000022ee067bca325dd27d0d9600c47b368c7a39df6ccd76202e9455e29398124c318c87a8ebbc48b6d5034f8d2083b78083330319d5c69dfa7f2a6a8752ebb2ba1dc9cf6be5fcd27ce973ef8b8eebed1a7a0a2359c515cc87b1de05f72f3518c679918122ff96b3c3ab3e0e2c13c1d4412f07f3161442c7239d68cfd7a7bffadf259c9db609b0e4c563858f46ddcd3f4db44065e5f7e1f74", @ANYRES32, @ANYBLOB="0000000000000500202e66696c6530000c25f6c99e29f1c1b6578f90853b5e25edd8b1a3160b45fd54ac41e5e8aa788b1f688c06244075357a2d5af885999dab08552ebdb96183898d98fdf7d79bf1e065592e170090c30d02e1d43a8490e24ecdb409e5dfebb8392e8faa6d0edad84565f8e209de7e3fe31dae120524b50121ff575a5789369b42d828d4b9d3fad21ef8fa4e4004d240c9aa016ff13c4b2dffa565097878bcc23c6a9eb903284bae65307f6059a0b552b201ff87b94b7f4c8996599444bd4c7fc2b4bec7bc4a44469a"]) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$smackfs_logging(r0, &(0x7f0000000000)=0x2, 0x14) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:15:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x38) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$smack_current(r2, &(0x7f0000000040)={'[-$-/{}:)]'}, 0xb) 19:15:05 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f, 0x2}}, 0x20) 19:15:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x7fff, 0x3f, {"881036dde8727e02ebd3fc86ec301edb"}, 0x1, 0xfff, 0xffffffffffffffff}}}, 0xa0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) (async) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000003c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x2c39, 0x7, "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", 0x7, 0x80, 0x95, 0x2, 0xf8, 0x7f, 0x20}, r4}}, 0x120) 19:15:05 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:05 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000300)=ANY=[@ANYBLOB="0100010001285800180000022ee067bca325dd27d0d9600c47b368c7a39df6ccd76202e9455e29398124c318c87a8ebbc48b6d5034f8d2083b78083330319d5c69dfa7f2a6a8752ebb2ba1dc9cf6be5fcd27ce973ef8b8eebed1a7a0a2359c515cc87b1de05f72f3518c679918122ff96b3c3ab3e0e2c13c1d4412f07f3161442c7239d68cfd7a7bffadf259c9db609b0e4c563858f46ddcd3f4db44065e5f7e1f74", @ANYRES32, @ANYBLOB="0000000000000500202e66696c6530000c25f6c99e29f1c1b6578f90853b5e25edd8b1a3160b45fd54ac41e5e8aa788b1f688c06244075357a2d5af885999dab08552ebdb96183898d98fdf7d79bf1e065592e170090c30d02e1d43a8490e24ecdb409e5dfebb8392e8faa6d0edad84565f8e209de7e3fe31dae120524b50121ff575a5789369b42d828d4b9d3fad21ef8fa4e4004d240c9aa016ff13c4b2dffa565097878bcc23c6a9eb903284bae65307f6059a0b552b201ff87b94b7f4c8996599444bd4c7fc2b4bec7bc4a44469a"]) (async) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$smackfs_logging(r0, &(0x7f0000000000)=0x2, 0x14) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:15:05 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f, 0x2}}, 0x20) 19:15:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x38) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$smack_current(r2, &(0x7f0000000040)={'[-$-/{}:)]'}, 0xb) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2, 0xe}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x38) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$smack_current(r2, &(0x7f0000000040)={'[-$-/{}:)]'}, 0xb) (async) 19:15:05 executing program 3: r0 = syz_io_uring_setup(0x77be, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x8, &(0x7f0000000100)={&(0x7f0000001000)}, 0x1) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000100)="ac3a54f347c4628c7b62b9b62e8a7fbbd7a0eb627a9cc7fe3beab43fe34d79b3704e6f2035b348c73879dc520e83c71cf7524315751ad7d8aa1299a7f0142a2a8a3888db6137668c9516ed778e226decce9bc76c8d399a96c8d652ced574f0ca2703ec9fb7aebd4e72df956ef55954908b9f74e65160ef2eb7917498515df8467d087369dda6f63388b4ca0d4775c9358c3bd9ad6542baa9342ef9163a0a5084765dceaa3a904bacacedf44dd2176db10b54b8eafe", 0xb5) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:05 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:05 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000300)=ANY=[@ANYBLOB="0100010001285800180000022ee067bca325dd27d0d9600c47b368c7a39df6ccd76202e9455e29398124c318c87a8ebbc48b6d5034f8d2083b78083330319d5c69dfa7f2a6a8752ebb2ba1dc9cf6be5fcd27ce973ef8b8eebed1a7a0a2359c515cc87b1de05f72f3518c679918122ff96b3c3ab3e0e2c13c1d4412f07f3161442c7239d68cfd7a7bffadf259c9db609b0e4c563858f46ddcd3f4db44065e5f7e1f74", @ANYRES32, @ANYBLOB="0000000000000500202e66696c6530000c25f6c99e29f1c1b6578f90853b5e25edd8b1a3160b45fd54ac41e5e8aa788b1f688c06244075357a2d5af885999dab08552ebdb96183898d98fdf7d79bf1e065592e170090c30d02e1d43a8490e24ecdb409e5dfebb8392e8faa6d0edad84565f8e209de7e3fe31dae120524b50121ff575a5789369b42d828d4b9d3fad21ef8fa4e4004d240c9aa016ff13c4b2dffa565097878bcc23c6a9eb903284bae65307f6059a0b552b201ff87b94b7f4c8996599444bd4c7fc2b4bec7bc4a44469a"]) (async) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) write$smackfs_logging(r0, &(0x7f0000000000)=0x2, 0x14) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) 19:15:05 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x6000, 0x0) fstat(r1, &(0x7f0000000100)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 19:15:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x3, {0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}, r1}}, 0x38) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$smack_current(r2, &(0x7f0000000040)={'[-$-/{}:)]'}, 0xb) 19:15:05 executing program 3: r0 = syz_io_uring_setup(0x77be, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x8, &(0x7f0000000100)={&(0x7f0000001000)}, 0x1) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000100)="ac3a54f347c4628c7b62b9b62e8a7fbbd7a0eb627a9cc7fe3beab43fe34d79b3704e6f2035b348c73879dc520e83c71cf7524315751ad7d8aa1299a7f0142a2a8a3888db6137668c9516ed778e226decce9bc76c8d399a96c8d652ced574f0ca2703ec9fb7aebd4e72df956ef55954908b9f74e65160ef2eb7917498515df8467d087369dda6f63388b4ca0d4775c9358c3bd9ad6542baa9342ef9163a0a5084765dceaa3a904bacacedf44dd2176db10b54b8eafe", 0xb5) (async) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000100)="ac3a54f347c4628c7b62b9b62e8a7fbbd7a0eb627a9cc7fe3beab43fe34d79b3704e6f2035b348c73879dc520e83c71cf7524315751ad7d8aa1299a7f0142a2a8a3888db6137668c9516ed778e226decce9bc76c8d399a96c8d652ced574f0ca2703ec9fb7aebd4e72df956ef55954908b9f74e65160ef2eb7917498515df8467d087369dda6f63388b4ca0d4775c9358c3bd9ad6542baa9342ef9163a0a5084765dceaa3a904bacacedf44dd2176db10b54b8eafe", 0xb5) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:05 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9aca00}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:05 executing program 3: r0 = syz_io_uring_setup(0x77be, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x8, &(0x7f0000000100)={&(0x7f0000001000)}, 0x1) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000100)="ac3a54f347c4628c7b62b9b62e8a7fbbd7a0eb627a9cc7fe3beab43fe34d79b3704e6f2035b348c73879dc520e83c71cf7524315751ad7d8aa1299a7f0142a2a8a3888db6137668c9516ed778e226decce9bc76c8d399a96c8d652ced574f0ca2703ec9fb7aebd4e72df956ef55954908b9f74e65160ef2eb7917498515df8467d087369dda6f63388b4ca0d4775c9358c3bd9ad6542baa9342ef9163a0a5084765dceaa3a904bacacedf44dd2176db10b54b8eafe", 0xb5) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_io_uring_setup(0x77be, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) (async) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x8, &(0x7f0000000100)={&(0x7f0000001000)}, 0x1) (async) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x11, &(0x7f0000000100)="ac3a54f347c4628c7b62b9b62e8a7fbbd7a0eb627a9cc7fe3beab43fe34d79b3704e6f2035b348c73879dc520e83c71cf7524315751ad7d8aa1299a7f0142a2a8a3888db6137668c9516ed778e226decce9bc76c8d399a96c8d652ced574f0ca2703ec9fb7aebd4e72df956ef55954908b9f74e65160ef2eb7917498515df8467d087369dda6f63388b4ca0d4775c9358c3bd9ad6542baa9342ef9163a0a5084765dceaa3a904bacacedf44dd2176db10b54b8eafe", 0xb5) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:05 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) syz_io_uring_setup(0x3d1b, &(0x7f0000000000)={0x0, 0x6b24, 0x10, 0x1, 0x190}, &(0x7f0000000080), &(0x7f0000000100)) 19:15:05 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x6000, 0x0) fstat(r1, &(0x7f0000000100)) (async) fstat(r1, &(0x7f0000000100)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 19:15:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b00000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0xfffffffffffffd62) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) 19:15:06 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x6000, 0x0) fstat(r1, &(0x7f0000000100)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 19:15:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) syz_io_uring_setup(0x3d1b, &(0x7f0000000000)={0x0, 0x6b24, 0x10, 0x1, 0x190}, &(0x7f0000000080), &(0x7f0000000100)) 19:15:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0xfffffffffffffd62) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x2, {0xa, 0xfffd, 0x0, @private2={0xfc, 0x2, '\x00', 0xfd}}, r1}}, 0x38) 19:15:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) syz_io_uring_setup(0x3d1b, &(0x7f0000000000)={0x0, 0x6b24, 0x10, 0x1, 0x190}, &(0x7f0000000080), &(0x7f0000000100)) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) syz_io_uring_setup(0x3d1b, &(0x7f0000000000)={0x0, 0x6b24, 0x10, 0x1, 0x190}, &(0x7f0000000080), &(0x7f0000000100)) (async) 19:15:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{0x0, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042a80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042c80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042e80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000043080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000043280)={{0x0, 0x7, 0x2, 0x10001, 0x8, 0x6, 0x3df92fe5, 0x8001, 0x6, 0x7, 0x80000000, 0xffffffffffffffff, 0x8000, 0x4, 0x6f}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000043340)={0x8000000000000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0xa8, "510b7cffb7ac68"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000044340)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000044540)={0x0, ""/256, 0x0, 0x0}) r14 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r15, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000044740)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000044940)={0xe000000000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "f2c699367d9145"}) r18 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r18, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r19, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000045940)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "ff15dbccdf0e73"}) r21 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r21, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r22, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000046940)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "13a65914f65a91"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000047940)={{0x0, 0xffffffffffffffff, 0x2, 0x8001, 0x3, 0x3f, 0x8000, 0x6, 0x2, 0x8, 0x3ff, 0x1c9, 0x7, 0x8000000000000001, 0x10001}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048940)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048b40)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r4}, {r6, r8}, {0x0, r9}, {}, {r10}, {r11, r12}, {0x0, r13}, {r15, r16}, {0x0, r17}, {r19}, {0x0, r20}, {r22}, {r23}, {r24, r25}], 0x7f, "6b25f01193a69d"}) 19:15:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0xfffffffffffffd62) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) 19:15:06 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x2, {0xa, 0xfffd, 0x0, @private2={0xfc, 0x2, '\x00', 0xfd}}, r1}}, 0x38) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x12b403) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x4, "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", 0x20, 0x19, 0x1, 0x0, 0x2a, 0x81, 0x2, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:06 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{0x0, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async, rerun: 64) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042a80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042c80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042e80)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000043080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000043280)={{0x0, 0x7, 0x2, 0x10001, 0x8, 0x6, 0x3df92fe5, 0x8001, 0x6, 0x7, 0x80000000, 0xffffffffffffffff, 0x8000, 0x4, 0x6f}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000043340)={0x8000000000000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0xa8, "510b7cffb7ac68"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000044340)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000044540)={0x0, ""/256, 0x0, 0x0}) (async, rerun: 64) r14 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r15, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000044740)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000044940)={0xe000000000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "f2c699367d9145"}) (async) r18 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r18, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r19, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000045940)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "ff15dbccdf0e73"}) r21 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r21, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r22, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000046940)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "13a65914f65a91"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000047940)={{0x0, 0xffffffffffffffff, 0x2, 0x8001, 0x3, 0x3f, 0x8000, 0x6, 0x2, 0x8, 0x3ff, 0x1c9, 0x7, 0x8000000000000001, 0x10001}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048940)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048b40)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r4}, {r6, r8}, {0x0, r9}, {}, {r10}, {r11, r12}, {0x0, r13}, {r15, r16}, {0x0, r17}, {r19}, {0x0, r20}, {r22}, {r23}, {r24, r25}], 0x7f, "6b25f01193a69d"}) 19:15:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x2, {0xa, 0xfffd, 0x0, @private2={0xfc, 0x2, '\x00', 0xfd}}, r1}}, 0x38) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x12b403) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:06 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x4, "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", 0x20, 0x19, 0x1, 0x0, 0x2a, 0x81, 0x2, 0x1}, r2}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r0}}, 0x38) 19:15:06 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x12b403) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x4, "35f42d3cccc20ab67f92e647e3e94a3edb0eb878e5437d4a7a12fa0b300b65c63aaf45640d2e36c3c896a0c20bd95ecb905e53207f57768ae907ef4c6770e7cf955fd71a1ea05f450c40534b9d33ac294edd49bba8822004244573a091f24538fb18017e4ea351c6144131a33c434b585f092a56d866f6b8bd41f09012f77cf41d41c3906709d0d36f789018072272033e31a84a445349b0fa6d1cbfc9ecc9e8d1e406c53df8677ac501a7a0b5958f5700a3dfc42eaf0ab07df3c78584469507c57cc0608e74f19849ed734961b6491bdf29213551709facf2d312696488ece33f53c34618d1a792a38bd9306c97e8825208fe5e1d00b62d80ba262725bc9733", 0x20, 0x19, 0x1, 0x0, 0x2a, 0x81, 0x2, 0x1}, r2}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r0}}, 0x38) 19:15:06 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x5d3843) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x48040) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{0x0, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042a80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042c80)={0x0, ""/256, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000042e80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000043080)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000043280)={{0x0, 0x7, 0x2, 0x10001, 0x8, 0x6, 0x3df92fe5, 0x8001, 0x6, 0x7, 0x80000000, 0xffffffffffffffff, 0x8000, 0x4, 0x6f}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000043340)={0x8000000000000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0xa8, "510b7cffb7ac68"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000044340)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000044540)={0x0, ""/256, 0x0, 0x0}) (async) r14 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r15, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000044740)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000044940)={0xe000000000000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "f2c699367d9145"}) (async) r18 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r18, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r19, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000045940)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "ff15dbccdf0e73"}) (async) r21 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r21, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r22, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000046940)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x3f, "13a65914f65a91"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000047940)={{0x0, 0xffffffffffffffff, 0x2, 0x8001, 0x3, 0x3f, 0x8000, 0x6, 0x2, 0x8, 0x3ff, 0x1c9, 0x7, 0x8000000000000001, 0x10001}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048940)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048b40)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r4}, {r6, r8}, {0x0, r9}, {}, {r10}, {r11, r12}, {0x0, r13}, {r15, r16}, {0x0, r17}, {r19}, {0x0, r20}, {r22}, {r23}, {r24, r25}], 0x7f, "6b25f01193a69d"}) 19:15:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r0}}, 0x38) 19:15:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x5d3843) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x48040) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x5d3843) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x48040) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x12}}, 0x10) 19:15:06 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6, 0x4, "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", 0xff, 0xa6, 0x40, 0x81, 0x4, 0x4, 0x62}, r1}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:06 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)=ANY=[@ANYBLOB="2156e092bbdc845a735561608bc8a6", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6400) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000680)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f00000026c0)={0x618, 0x58ee8da50a4b2760, 0x0, [{{0x1, 0x3, 0x1, 0x10001, 0x1, 0x6, {0x5, 0x8, 0x4, 0x7, 0x0, 0x6, 0x3, 0xa3d, 0x0, 0x4000, 0x7, 0x0, 0xffffffffffffffff, 0x7ff, 0x7282}}, {0x5, 0xf4, 0x19, 0x10001, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x3, 0x0, 0x7fff, 0x4, 0x7ff, 0x4, {0x5, 0x8, 0x8, 0x800, 0x212, 0x19f9, 0xad50, 0x8, 0x800, 0xa000, 0x7, 0xee01, 0xee00, 0x2, 0x9}}, {0x4, 0x8, 0x19, 0x2, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x0, 0x3, 0x0, 0xbc, 0x10000, 0x5, {0x4, 0x0, 0x0, 0x10000, 0x1, 0x8, 0x8, 0x1f, 0x1000, 0xd000, 0x4, 0x0, r2, 0x7, 0x6}}, {0x2, 0xffffffffffff8fca, 0x19, 0x10000, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x1, 0x4, 0x4, 0x4, 0x40, 0x40, {0x1, 0x40, 0xfffffffffffffffd, 0x400000000000, 0x4a34, 0x32, 0x6, 0x4d, 0x10000, 0x6000, 0xfffffff8, 0xffffffffffffffff, 0xee00, 0x5, 0x1}}, {0x6, 0x7f, 0x19, 0x1f, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x4, 0x2, 0x1, 0x80000000, 0x0, 0x3ff, {0x2, 0x4, 0x80, 0xffffffff00000001, 0x4, 0x1ba, 0x7, 0xf7, 0xffff932d, 0x1000, 0x0, r3, 0xffffffffffffffff, 0x6, 0x1800}}, {0x5, 0x7, 0x19, 0x40, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x6, 0x1, 0x3ff, 0x7, 0x80000000, 0xa3, {0x4, 0x76c, 0x8000000000000001, 0x10000, 0x6, 0xffff, 0x3ff, 0xfffffff9, 0x10a9, 0x6000, 0x0, 0xee01, r4, 0x5, 0x2}}, {0x2, 0xfff, 0x0, 0x400}}, {{0x0, 0x1, 0x9, 0x7, 0x8001, 0x4, {0x1, 0xfff, 0x7, 0x6, 0x0, 0x9, 0x7fff, 0xd04, 0xfffffffa, 0x2000, 0x8, r5, r6, 0x9, 0xffff}}, {0x3, 0x6, 0x2, 0x6, '#\\'}}, {{0x1, 0x2, 0x20, 0x8000, 0x101, 0x100, {0x5, 0x0, 0x1000, 0x3, 0x1, 0xa3b, 0x3, 0x1, 0xc83e, 0xc000, 0x6, r7, 0xffffffffffffffff, 0x8000, 0x7}}, {0x4, 0x80000000, 0x1, 0x3ff, '&'}}, {{0x0, 0x1, 0x2, 0x8, 0x6, 0x80000001, {0x6, 0x5, 0x4, 0x5, 0x8, 0x2, 0x5, 0x1, 0x5, 0x8000, 0x101, 0xffffffffffffffff, 0xee00, 0xffffffff, 0x40}}, {0x6, 0x2, 0x0, 0x9}}]}, 0x618) 19:15:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$cgroup_pressure(r1, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x12}}, 0x10) 19:15:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6, 0x4, "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", 0xff, 0xa6, 0x40, 0x81, 0x4, 0x4, 0x62}, r1}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6, 0x4, "bd4d870cc2a79cfdc2b05fa589c389a174f726c9adb04efc367968994fbc8884b19498dc5ddedee4fb05241f5b8158e67ca91bb63ba11e944f753d9c0cb7db42a13ba080a56b9c24e2046a6bdfa8213d6e2031cbfd813f17e0f30c73a042229c259e5bb78a27f8a32a6a3da0f54b856f0e714cb20638f5ac33a39f9784afefbaecfc93d52898a81540c0be1f878f5425cd175fb6fa6885823c487ff5cb9c9605059c24a4750e10adbc13f74715f1b404a0e809421fb4e5592c6ab5c369d5c4b88ef97bfc537686df2f489ccacb82117d7295da99f0bb385cb9276b06b2c08e1714f2f6b72047637c1816575c6199bf5d8281be655fffe2b16922b068685af398", 0xff, 0xa6, 0x40, 0x81, 0x4, 0x4, 0x62}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) 19:15:07 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)=ANY=[@ANYBLOB="2156e092bbdc845a735561608bc8a6", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6400) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000680)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f00000026c0)={0x618, 0x58ee8da50a4b2760, 0x0, [{{0x1, 0x3, 0x1, 0x10001, 0x1, 0x6, {0x5, 0x8, 0x4, 0x7, 0x0, 0x6, 0x3, 0xa3d, 0x0, 0x4000, 0x7, 0x0, 0xffffffffffffffff, 0x7ff, 0x7282}}, {0x5, 0xf4, 0x19, 0x10001, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x3, 0x0, 0x7fff, 0x4, 0x7ff, 0x4, {0x5, 0x8, 0x8, 0x800, 0x212, 0x19f9, 0xad50, 0x8, 0x800, 0xa000, 0x7, 0xee01, 0xee00, 0x2, 0x9}}, {0x4, 0x8, 0x19, 0x2, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x0, 0x3, 0x0, 0xbc, 0x10000, 0x5, {0x4, 0x0, 0x0, 0x10000, 0x1, 0x8, 0x8, 0x1f, 0x1000, 0xd000, 0x4, 0x0, r2, 0x7, 0x6}}, {0x2, 0xffffffffffff8fca, 0x19, 0x10000, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x1, 0x4, 0x4, 0x4, 0x40, 0x40, {0x1, 0x40, 0xfffffffffffffffd, 0x400000000000, 0x4a34, 0x32, 0x6, 0x4d, 0x10000, 0x6000, 0xfffffff8, 0xffffffffffffffff, 0xee00, 0x5, 0x1}}, {0x6, 0x7f, 0x19, 0x1f, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x4, 0x2, 0x1, 0x80000000, 0x0, 0x3ff, {0x2, 0x4, 0x80, 0xffffffff00000001, 0x4, 0x1ba, 0x7, 0xf7, 0xffff932d, 0x1000, 0x0, r3, 0xffffffffffffffff, 0x6, 0x1800}}, {0x5, 0x7, 0x19, 0x40, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x6, 0x1, 0x3ff, 0x7, 0x80000000, 0xa3, {0x4, 0x76c, 0x8000000000000001, 0x10000, 0x6, 0xffff, 0x3ff, 0xfffffff9, 0x10a9, 0x6000, 0x0, 0xee01, r4, 0x5, 0x2}}, {0x2, 0xfff, 0x0, 0x400}}, {{0x0, 0x1, 0x9, 0x7, 0x8001, 0x4, {0x1, 0xfff, 0x7, 0x6, 0x0, 0x9, 0x7fff, 0xd04, 0xfffffffa, 0x2000, 0x8, r5, r6, 0x9, 0xffff}}, {0x3, 0x6, 0x2, 0x6, '#\\'}}, {{0x1, 0x2, 0x20, 0x8000, 0x101, 0x100, {0x5, 0x0, 0x1000, 0x3, 0x1, 0xa3b, 0x3, 0x1, 0xc83e, 0xc000, 0x6, r7, 0xffffffffffffffff, 0x8000, 0x7}}, {0x4, 0x80000000, 0x1, 0x3ff, '&'}}, {{0x0, 0x1, 0x2, 0x8, 0x6, 0x80000001, {0x6, 0x5, 0x4, 0x5, 0x8, 0x2, 0x5, 0x1, 0x5, 0x8000, 0x101, 0xffffffffffffffff, 0xee00, 0xffffffff, 0x40}}, {0x6, 0x2, 0x0, 0x9}}]}, 0x618) 19:15:07 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x5d3843) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x48040) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x5d3843) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x48040) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$cgroup_pressure(r1, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x12}}, 0x10) 19:15:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6, 0x4, "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", 0xff, 0xa6, 0x40, 0x81, 0x4, 0x4, 0x62}, r1}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x6, 0x4, "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", 0xff, 0xa6, 0x40, 0x81, 0x4, 0x4, 0x62}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 1: mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x1000) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x8) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0), 0x8b00, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000000)=""/135, 0x87) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) 19:15:07 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000400)=ANY=[@ANYBLOB="2156e092bbdc845a735561608bc8a6", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6400) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file0\x00'}) (async) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000680)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f00000026c0)={0x618, 0x58ee8da50a4b2760, 0x0, [{{0x1, 0x3, 0x1, 0x10001, 0x1, 0x6, {0x5, 0x8, 0x4, 0x7, 0x0, 0x6, 0x3, 0xa3d, 0x0, 0x4000, 0x7, 0x0, 0xffffffffffffffff, 0x7ff, 0x7282}}, {0x5, 0xf4, 0x19, 0x10001, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x3, 0x0, 0x7fff, 0x4, 0x7ff, 0x4, {0x5, 0x8, 0x8, 0x800, 0x212, 0x19f9, 0xad50, 0x8, 0x800, 0xa000, 0x7, 0xee01, 0xee00, 0x2, 0x9}}, {0x4, 0x8, 0x19, 0x2, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x0, 0x3, 0x0, 0xbc, 0x10000, 0x5, {0x4, 0x0, 0x0, 0x10000, 0x1, 0x8, 0x8, 0x1f, 0x1000, 0xd000, 0x4, 0x0, r2, 0x7, 0x6}}, {0x2, 0xffffffffffff8fca, 0x19, 0x10000, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x1, 0x4, 0x4, 0x4, 0x40, 0x40, {0x1, 0x40, 0xfffffffffffffffd, 0x400000000000, 0x4a34, 0x32, 0x6, 0x4d, 0x10000, 0x6000, 0xfffffff8, 0xffffffffffffffff, 0xee00, 0x5, 0x1}}, {0x6, 0x7f, 0x19, 0x1f, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x4, 0x2, 0x1, 0x80000000, 0x0, 0x3ff, {0x2, 0x4, 0x80, 0xffffffff00000001, 0x4, 0x1ba, 0x7, 0xf7, 0xffff932d, 0x1000, 0x0, r3, 0xffffffffffffffff, 0x6, 0x1800}}, {0x5, 0x7, 0x19, 0x40, '/sys/fs/smackfs/ipv6host\x00'}}, {{0x6, 0x1, 0x3ff, 0x7, 0x80000000, 0xa3, {0x4, 0x76c, 0x8000000000000001, 0x10000, 0x6, 0xffff, 0x3ff, 0xfffffff9, 0x10a9, 0x6000, 0x0, 0xee01, r4, 0x5, 0x2}}, {0x2, 0xfff, 0x0, 0x400}}, {{0x0, 0x1, 0x9, 0x7, 0x8001, 0x4, {0x1, 0xfff, 0x7, 0x6, 0x0, 0x9, 0x7fff, 0xd04, 0xfffffffa, 0x2000, 0x8, r5, r6, 0x9, 0xffff}}, {0x3, 0x6, 0x2, 0x6, '#\\'}}, {{0x1, 0x2, 0x20, 0x8000, 0x101, 0x100, {0x5, 0x0, 0x1000, 0x3, 0x1, 0xa3b, 0x3, 0x1, 0xc83e, 0xc000, 0x6, r7, 0xffffffffffffffff, 0x8000, 0x7}}, {0x4, 0x80000000, 0x1, 0x3ff, '&'}}, {{0x0, 0x1, 0x2, 0x8, 0x6, 0x80000001, {0x6, 0x5, 0x4, 0x5, 0x8, 0x2, 0x5, 0x1, 0x5, 0x8000, 0x101, 0xffffffffffffffff, 0xee00, 0xffffffff, 0x40}}, {0x6, 0x2, 0x0, 0x9}}]}, 0x618) 19:15:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card1/oss_mixer\x00', 0x280100, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, r0, 0xe5fb1000) 19:15:07 executing program 1: mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x1000) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x8) (async) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x8) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0), 0x8b00, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000000)=""/135, 0x87) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) (async) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) 19:15:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) (async) 19:15:07 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x0, {0x98f3}}, 0x18) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:07 executing program 1: mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x1000) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x8) (async) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x8) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0), 0x8b00, 0x0) (async) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0), 0x8b00, 0x0) read$snapshot(0xffffffffffffffff, &(0x7f0000000000)=""/135, 0x87) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card1/oss_mixer\x00', 0x280100, 0x0) (async, rerun: 32) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, r0, 0xe5fb1000) (rerun: 32) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (rerun: 64) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x0, {0x98f3}}, 0x18) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:15:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 19:15:07 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x191002, 0x0) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee01, r3}}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) write$damon_monitor_on(r4, &(0x7f0000000100), 0x3) epoll_create1(0x0) 19:15:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card1/oss_mixer\x00', 0x280100, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, r0, 0xe5fb1000) 19:15:07 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) io_uring_register$IORING_REGISTER_IOWQ_AFF(r1, 0x11, &(0x7f0000000100)="52636880d689fa1192a20c510fefedfd851bb4fbcd7ae9afdb70745ae24001c111e434280d98070c6f9b81d333beee036c9f215637142c71b4045778f00c4ce4586c2d3fcaae505f8c6a78ea94f11c172e4bee3361cfcb48c1fc2d5e2b5031f7db5851a7622b879308e06cf1c2b0f947ec0b37349338835a384eadc1c2d3f2d8265f2853", 0x84) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xfffc, 0xd76, @private2}, r0}}, 0x38) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) openat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010100}}}, 0xa0) 19:15:07 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) io_uring_register$IORING_REGISTER_IOWQ_AFF(r1, 0x11, &(0x7f0000000100)="52636880d689fa1192a20c510fefedfd851bb4fbcd7ae9afdb70745ae24001c111e434280d98070c6f9b81d333beee036c9f215637142c71b4045778f00c4ce4586c2d3fcaae505f8c6a78ea94f11c172e4bee3361cfcb48c1fc2d5e2b5031f7db5851a7622b879308e06cf1c2b0f947ec0b37349338835a384eadc1c2d3f2d8265f2853", 0x84) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) 19:15:07 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x191002, 0x0) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee01, r3}}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) write$damon_monitor_on(r4, &(0x7f0000000100), 0x3) epoll_create1(0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x191002, 0x0) (async) fstat(r2, &(0x7f0000000000)) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee01, r3}}, './file0\x00'}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) write$damon_monitor_on(r4, &(0x7f0000000100), 0x3) (async) epoll_create1(0x0) (async) 19:15:07 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x0, {0x98f3}}, 0x18) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9aca00}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010100}}}, 0xa0) 19:15:07 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0xb}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xfffc, 0xd76, @private2}, r0}}, 0x38) (rerun: 32) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 19:15:07 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) io_uring_register$IORING_REGISTER_IOWQ_AFF(r1, 0x11, &(0x7f0000000100)="52636880d689fa1192a20c510fefedfd851bb4fbcd7ae9afdb70745ae24001c111e434280d98070c6f9b81d333beee036c9f215637142c71b4045778f00c4ce4586c2d3fcaae505f8c6a78ea94f11c172e4bee3361cfcb48c1fc2d5e2b5031f7db5851a7622b879308e06cf1c2b0f947ec0b37349338835a384eadc1c2d3f2d8265f2853", 0x84) (async) io_uring_register$IORING_REGISTER_IOWQ_AFF(r1, 0x11, &(0x7f0000000100)="52636880d689fa1192a20c510fefedfd851bb4fbcd7ae9afdb70745ae24001c111e434280d98070c6f9b81d333beee036c9f215637142c71b4045778f00c4ce4586c2d3fcaae505f8c6a78ea94f11c172e4bee3361cfcb48c1fc2d5e2b5031f7db5851a7622b879308e06cf1c2b0f947ec0b37349338835a384eadc1c2d3f2d8265f2853", 0x84) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0xa}}, 0x20) 19:15:07 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x191002, 0x0) (async) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140), 0x191002, 0x0) fstat(r2, &(0x7f0000000000)) (async) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee01, r3}}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) write$damon_monitor_on(r4, &(0x7f0000000100), 0x3) epoll_create1(0x0) (async) epoll_create1(0x0) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca9a3b00000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:07 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) openat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010100}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e23, @rand_addr=0x64010100}}}, 0xa0) (async) 19:15:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1ff}}, './file0\x00'}) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0x2) epoll_wait(r1, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:07 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0xb}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0xfffc, 0xd76, @private2}, r0}}, 0x38) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 19:15:07 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:08 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:08 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x20000}}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x101800, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000100)={{0x0, 0x6be, 0x8f5d, 0x0, 0x34, 0x8, 0x8, 0x80000000, 0xfffffffc, 0xc22, 0x1, 0x5a9c, 0x6, 0x0, 0x24bc}, 0x10, [0x0, 0x0]}) 19:15:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x10, 0x640, 0xfffffffffffffe00, 0x2, 0x4, 0x6, 0xfffffff7, 0x7, 0x263, 0xd61a, 0x1, 0xe9d, 0x4, 0x6}}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:08 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e21, 0x0, @private2, 0x3bd}, r1}}, 0x38) 19:15:08 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:08 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x20000}}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x101800, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000100)={{0x0, 0x6be, 0x8f5d, 0x0, 0x34, 0x8, 0x8, 0x80000000, 0xfffffffc, 0xc22, 0x1, 0x5a9c, 0x6, 0x0, 0x24bc}, 0x10, [0x0, 0x0]}) 19:15:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1ff}}, './file0\x00'}) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0x2) (async) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0x2) epoll_wait(r1, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:08 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x10, 0x640, 0xfffffffffffffe00, 0x2, 0x4, 0x6, 0xfffffff7, 0x7, 0x263, 0xd61a, 0x1, 0xe9d, 0x4, 0x6}}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:08 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x40500, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000180)={{0x0, 0x0, 0x100, 0x8, 0xa86, 0x5, 0x81, 0xffe000, 0x1, 0x4, 0x3, 0x8, 0x6, 0x2, 0xfffffffffffffffa}, 0x10, [0x0, 0x0]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r3, r4}}, './file0\x00'}) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 19:15:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e21, 0x0, @private2, 0x3bd}, r1}}, 0x38) 19:15:08 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1ff}}, './file0\x00'}) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0x2) (async) epoll_wait(r1, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x5) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:08 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x20000}}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x101800, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000100)={{0x0, 0x6be, 0x8f5d, 0x0, 0x34, 0x8, 0x8, 0x80000000, 0xfffffffc, 0xc22, 0x1, 0x5a9c, 0x6, 0x0, 0x24bc}, 0x10, [0x0, 0x0]}) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x20000}}, './file0\x00'}) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x101800, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000100)={{0x0, 0x6be, 0x8f5d, 0x0, 0x34, 0x8, 0x8, 0x80000000, 0xfffffffc, 0xc22, 0x1, 0x5a9c, 0x6, 0x0, 0x24bc}, 0x10, [0x0, 0x0]}) (async) 19:15:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000000c0)={{0x0, 0x10, 0x640, 0xfffffffffffffe00, 0x2, 0x4, 0x6, 0xfffffff7, 0x7, 0x263, 0xd61a, 0x1, 0xe9d, 0x4, 0x6}}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:08 executing program 0: pselect6(0x40, &(0x7f0000000240)={0x1, 0xc642, 0x7fff, 0x300000, 0x1000, 0x4e83d1e1, 0xc198, 0x4}, &(0x7f0000000280)={0x8, 0x10001, 0xffffffffffffffff, 0x4e89, 0x6ff, 0x1, 0x4, 0x7}, &(0x7f00000002c0)={0x4, 0x1, 0x80000000, 0x3, 0x401, 0x0, 0x0, 0x80}, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={[0x7]}, 0x8}) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x6, 0x5, 0xaf8, 0x7, 0x5, 0x9, 0x3, 0x3f}, &(0x7f00000000c0)={0xee3b, 0x14000, 0x1, 0x6, 0x17f606fd, 0x7fffffffffffffff, 0x7fffffff, 0x7}, &(0x7f0000000140)={0x81, 0x4, 0x7fff, 0x7, 0xff, 0x6, 0x6b7, 0x1af00fb5}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 19:15:08 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e21, 0x0, @private2, 0x3bd}, r1}}, 0x38) 19:15:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi,e0\x00']) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r4 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[r2, r0, r3, 0xffffffffffffffff, r0, r4]}, 0x6) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x0, r6, 0x30, 0x1, @ib={0x1b, 0x9, 0x1, {"a42e9d3a2dbbe865b412cf5f2824353f"}, 0x5, 0x36fb677d, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x3, r6, 0x30, 0x0, @ib={0x1b, 0x8001, 0x0, {"7bde2b9ded8d0eff3194306e7b08f8d3"}, 0x3, 0x10000, 0x39}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:08 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x40500, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000180)={{0x0, 0x0, 0x100, 0x8, 0xa86, 0x5, 0x81, 0xffe000, 0x1, 0x4, 0x3, 0x8, 0x6, 0x2, 0xfffffffffffffffa}, 0x10, [0x0, 0x0]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r3, r4}}, './file0\x00'}) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 19:15:08 executing program 1: io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000008, 0x10, 0xffffffffffffffff, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) 19:15:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000008, 0x12, 0xffffffffffffffff, 0x0) 19:15:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/card2/oss_mixer\x00', 0x248000, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r2, 0x13}}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi,e0\x00']) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) r4 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[r2, r0, r3, 0xffffffffffffffff, r0, r4]}, 0x6) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) (async) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x0, r6, 0x30, 0x1, @ib={0x1b, 0x9, 0x1, {"a42e9d3a2dbbe865b412cf5f2824353f"}, 0x5, 0x36fb677d, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x3, r6, 0x30, 0x0, @ib={0x1b, 0x8001, 0x0, {"7bde2b9ded8d0eff3194306e7b08f8d3"}, 0x3, 0x10000, 0x39}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:08 executing program 0: pselect6(0x40, &(0x7f0000000240)={0x1, 0xc642, 0x7fff, 0x300000, 0x1000, 0x4e83d1e1, 0xc198, 0x4}, &(0x7f0000000280)={0x8, 0x10001, 0xffffffffffffffff, 0x4e89, 0x6ff, 0x1, 0x4, 0x7}, &(0x7f00000002c0)={0x4, 0x1, 0x80000000, 0x3, 0x401, 0x0, 0x0, 0x80}, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={[0x7]}, 0x8}) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) pselect6(0x40, &(0x7f0000000000)={0x6, 0x5, 0xaf8, 0x7, 0x5, 0x9, 0x3, 0x3f}, &(0x7f00000000c0)={0xee3b, 0x14000, 0x1, 0x6, 0x17f606fd, 0x7fffffffffffffff, 0x7fffffff, 0x7}, &(0x7f0000000140)={0x81, 0x4, 0x7fff, 0x7, 0xff, 0x6, 0x6b7, 0x1af00fb5}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) pselect6(0x40, &(0x7f0000000240)={0x1, 0xc642, 0x7fff, 0x300000, 0x1000, 0x4e83d1e1, 0xc198, 0x4}, &(0x7f0000000280)={0x8, 0x10001, 0xffffffffffffffff, 0x4e89, 0x6ff, 0x1, 0x4, 0x7}, &(0x7f00000002c0)={0x4, 0x1, 0x80000000, 0x3, 0x401, 0x0, 0x0, 0x80}, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={[0x7]}, 0x8}) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x6, 0x5, 0xaf8, 0x7, 0x5, 0x9, 0x3, 0x3f}, &(0x7f00000000c0)={0xee3b, 0x14000, 0x1, 0x6, 0x17f606fd, 0x7fffffffffffffff, 0x7fffffff, 0x7}, &(0x7f0000000140)={0x81, 0x4, 0x7fff, 0x7, 0xff, 0x6, 0x6b7, 0x1af00fb5}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) (async) 19:15:08 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x40500, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000180)={{0x0, 0x0, 0x100, 0x8, 0xa86, 0x5, 0x81, 0xffe000, 0x1, 0x4, 0x3, 0x8, 0x6, 0x2, 0xfffffffffffffffa}, 0x10, [0x0, 0x0]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r3, r4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {r3, r4}}, './file0\x00'}) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) (async) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 19:15:08 executing program 1: io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000008, 0x10, 0xffffffffffffffff, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) 19:15:08 executing program 0: pselect6(0x40, &(0x7f0000000240)={0x1, 0xc642, 0x7fff, 0x300000, 0x1000, 0x4e83d1e1, 0xc198, 0x4}, &(0x7f0000000280)={0x8, 0x10001, 0xffffffffffffffff, 0x4e89, 0x6ff, 0x1, 0x4, 0x7}, &(0x7f00000002c0)={0x4, 0x1, 0x80000000, 0x3, 0x401, 0x0, 0x0, 0x80}, &(0x7f0000000300), &(0x7f0000000380)={&(0x7f0000000340)={[0x7]}, 0x8}) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) pselect6(0x40, &(0x7f0000000000)={0x6, 0x5, 0xaf8, 0x7, 0x5, 0x9, 0x3, 0x3f}, &(0x7f00000000c0)={0xee3b, 0x14000, 0x1, 0x6, 0x17f606fd, 0x7fffffffffffffff, 0x7fffffff, 0x7}, &(0x7f0000000140)={0x81, 0x4, 0x7fff, 0x7, 0xff, 0x6, 0x6b7, 0x1af00fb5}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) (rerun: 64) 19:15:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000008, 0x12, 0xffffffffffffffff, 0x0) 19:15:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) (async) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/card2/oss_mixer\x00', 0x248000, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r2, 0x13}}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:08 executing program 1: io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000008, 0x10, 0xffffffffffffffff, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) 19:15:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./fi,e0\x00']) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) r4 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000100)='io.pressure\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[r2, r0, r3, 0xffffffffffffffff, r0, r4]}, 0x6) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x120) (async) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x0, r6, 0x30, 0x1, @ib={0x1b, 0x9, 0x1, {"a42e9d3a2dbbe865b412cf5f2824353f"}, 0x5, 0x36fb677d, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x3, r6, 0x30, 0x0, @ib={0x1b, 0x8001, 0x0, {"7bde2b9ded8d0eff3194306e7b08f8d3"}, 0x3, 0x10000, 0x39}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:08 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000008, 0x12, 0xffffffffffffffff, 0x0) 19:15:08 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x120) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/card2/oss_mixer\x00', 0x248000, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r2, 0x13}}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) read$smackfs_logging(0xffffffffffffffff, &(0x7f0000000080), 0x14) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x4b74a2d1, 0x0, &(0x7f00000000c0)=[r1, r0, r2]}, 0x3) 19:15:08 executing program 1: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card1/oss_mixer\x00', 0x200000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000046c69925f3e6970fc792d5a8e88ddf536f534a20bcce0545a5827ef7e2cc743823c15a386daaa97ef0e320d6b87d2b2c648d291b2f2e462eeb1af5b26a8e16926cbaa76a7ce5f8c9f9e4e8771f9b347e8a93981e96227141131c2bdc4e04d32127d833fd827232b2fb0596df2f069b5669e294499c69f06652a3ad354a3edbe38664b067997329323a87b3469803c44ddf2d58cb04f6ae461413ee04afceeae0d87120f489d2a", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 19:15:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:08 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) pselect6(0x40, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) 19:15:08 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) write$smackfs_ipv6host(r0, 0x0, 0xb9) (rerun: 64) 19:15:08 executing program 1: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card1/oss_mixer\x00', 0x200000, 0x0) (async, rerun: 32) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) (async, rerun: 64) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000046c69925f3e6970fc792d5a8e88ddf536f534a20bcce0545a5827ef7e2cc743823c15a386daaa97ef0e320d6b87d2b2c648d291b2f2e462eeb1af5b26a8e16926cbaa76a7ce5f8c9f9e4e8771f9b347e8a93981e96227141131c2bdc4e04d32127d833fd827232b2fb0596df2f069b5669e294499c69f06652a3ad354a3edbe38664b067997329323a87b3469803c44ddf2d58cb04f6ae461413ee04afceeae0d87120f489d2a", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 19:15:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) read$smackfs_logging(0xffffffffffffffff, &(0x7f0000000080), 0x14) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x4b74a2d1, 0x0, &(0x7f00000000c0)=[r1, r0, r2]}, 0x3) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x4b74a2d1, 0x0, &(0x7f00000000c0)=[r1, r0, r2]}, 0x3) 19:15:08 executing program 2: openat$urandom(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:08 executing program 0: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) pselect6(0x40, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) pselect6(0x40, &(0x7f0000000040)={0x0, 0xfffffffffffffffd}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) 19:15:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:09 executing program 0: pselect6(0x40, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x100000001, 0xfffffffffffffffc}, &(0x7f0000000080)={0x2, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) 19:15:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) read$smackfs_logging(0xffffffffffffffff, &(0x7f0000000080), 0x14) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000100)={0x4b74a2d1, 0x0, &(0x7f00000000c0)=[r1, r0, r2]}, 0x3) 19:15:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:09 executing program 2: openat$urandom(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @multicast1}}}, 0xa0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$urandom(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @multicast1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) 19:15:09 executing program 4: openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:09 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB=' \x00'/40], &(0x7f00000000c0), 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r4}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0xd710, 0xfd, "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", 0x81, 0x40, 0x2, 0x2, 0x3, 0x46}, r5}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:09 executing program 0: pselect6(0x40, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x100000001, 0xfffffffffffffffc}, &(0x7f0000000080)={0x2, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) 19:15:09 executing program 1: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card1/oss_mixer\x00', 0x200000, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) (async) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000046c69925f3e6970fc792d5a8e88ddf536f534a20bcce0545a5827ef7e2cc743823c15a386daaa97ef0e320d6b87d2b2c648d291b2f2e462eeb1af5b26a8e16926cbaa76a7ce5f8c9f9e4e8771f9b347e8a93981e96227141131c2bdc4e04d32127d833fd827232b2fb0596df2f069b5669e294499c69f06652a3ad354a3edbe38664b067997329323a87b3469803c44ddf2d58cb04f6ae461413ee04afceeae0d87120f489d2a", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 19:15:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x3}}, 0x20) 19:15:09 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0xfffffffffffffd49) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r3}, 0x50) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, r3, {0x0, 0x8}}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:09 executing program 2: openat$urandom(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) (async, rerun: 32) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e20, @multicast1}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:09 executing program 0: pselect6(0x40, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x100000001, 0xfffffffffffffffc}, &(0x7f0000000080)={0x2, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000040)={0x77359400}, 0x0) 19:15:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x3}}, 0x20) 19:15:09 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB=' \x00'/40], &(0x7f00000000c0), 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r4}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0xd710, 0xfd, "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", 0x81, 0x40, 0x2, 0x2, 0x3, 0x46}, r5}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) (async) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB=' \x00'/40], &(0x7f00000000c0), 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r4}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0xd710, 0xfd, "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", 0x81, 0x40, 0x2, 0x2, 0x3, 0x46}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) 19:15:09 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0xfffffffffffffd49) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r3}, 0x50) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, r3, {0x0, 0x8}}, 0x20) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x3}}, 0x20) 19:15:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0, @ANYBLOB]) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x4) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000180)={{0x0, 0x7, 0x80000000, 0x1, 0x6, 0x100000000, 0x4, 0x3, 0x9, 0x3cb2, 0x3, 0x800, 0x5, 0x2, 0x9}}) openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:09 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000000c0)) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000140)={0x82, 0x9, 0x7f, 0x4, 0xff, 0x100000000, 0x2, 0xcf10}, &(0x7f0000000180)={0x40, 0x8fd6, 0x1, 0xf6, 0x1b, 0x101, 0x0, 0x4}, &(0x7f00000001c0)={0x1fffffffc00000, 0x8, 0x80, 0x49b, 0x8001, 0xe012, 0x8, 0xfffffffffffff801}, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x8001]}, 0x8}) 19:15:09 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB=' \x00'/40], &(0x7f00000000c0), 0x0) (async) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB=' \x00'/40], &(0x7f00000000c0), 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r3, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r2, {r4}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0xd710, 0xfd, "a1d0aa862e674b99e14042ba1e247f3b4e678f3f10511622b0ea7ef074e22eee390acea8cf2656802c78da4096653edec23b5f4b6b339a9312f21fe76c319c2b8d7762d0db5266ceca025242b93410543b7de443f88a47f7ab553bffdbb672eac3b801828f8582651893fa431a225bec2c6f126d0b8402cf4848b5256c64e7e7405d5d26c7db18dc9b5d8eee565d0715a9a778253498d8c035e145f542abc6ca7710212807b0e7a3672e08ea123e497f2b5535320251e9aa46ff74d4d1285ea9db019f4dd290c3590aadc5935f0c492692821c93603f3ce72737365594adfa2bd11d0f65cf099473494efcab54675afd051323fc07eb4d8f0c239c6ee4c13eff", 0x81, 0x40, 0x2, 0x2, 0x3, 0x46}, r5}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:09 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async, rerun: 32) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0xfffffffffffffd49) write$FUSE_INIT(r1, &(0x7f0000002100)={0x50, 0x0, r3}, 0x50) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, r3, {0x0, 0x8}}, 0x20) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:09 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000000c0)) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000140)={0x82, 0x9, 0x7f, 0x4, 0xff, 0x100000000, 0x2, 0xcf10}, &(0x7f0000000180)={0x40, 0x8fd6, 0x1, 0xf6, 0x1b, 0x101, 0x0, 0x4}, &(0x7f00000001c0)={0x1fffffffc00000, 0x8, 0x80, 0x49b, 0x8001, 0xe012, 0x8, 0xfffffffffffff801}, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x8001]}, 0x8}) 19:15:09 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$sequencer(r0, &(0x7f0000000180)=[@l={0x92, 0x0, 0xc0, 0x5, 0x40, 0x7f, 0x401}, @x={0x94, 0x9, "673f95878dec"}, @v={0x93, 0xc, 0x90, 0x1d, @MIDI_NOTEON=@special, 0xfe, 0x3f}, @echo=0x484a, @l={0x92, 0xa, 0xd0, 0x3, 0x20, 0x1, 0x8001}, @s={0x5, @generic=0xff, 0xb, 0xfc}], 0x28) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x28000, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r5, 0xee00}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:09 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0, @ANYBLOB]) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x4) (async) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x4) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000180)={{0x0, 0x7, 0x80000000, 0x1, 0x6, 0x100000000, 0x4, 0x3, 0x9, 0x3cb2, 0x3, 0x800, 0x5, 0x2, 0x9}}) openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8001, 0x8000, "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", 0x5, 0x7, 0x3f, 0x20, 0x1, 0x80, 0x9}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:09 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$sequencer(r0, &(0x7f0000000180)=[@l={0x92, 0x0, 0xc0, 0x5, 0x40, 0x7f, 0x401}, @x={0x94, 0x9, "673f95878dec"}, @v={0x93, 0xc, 0x90, 0x1d, @MIDI_NOTEON=@special, 0xfe, 0x3f}, @echo=0x484a, @l={0x92, 0xa, 0xd0, 0x3, 0x20, 0x1, 0x8001}, @s={0x5, @generic=0xff, 0xb, 0xfc}], 0x28) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x28000, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r5, 0xee00}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) write$sequencer(r0, &(0x7f0000000180)=[@l={0x92, 0x0, 0xc0, 0x5, 0x40, 0x7f, 0x401}, @x={0x94, 0x9, "673f95878dec"}, @v={0x93, 0xc, 0x90, 0x1d, @MIDI_NOTEON=@special, 0xfe, 0x3f}, @echo=0x484a, @l={0x92, 0xa, 0xd0, 0x3, 0x20, 0x1, 0x8001}, @s={0x5, @generic=0xff, 0xb, 0xfc}], 0x28) (async) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x28000, 0x0) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r5, 0xee00}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:09 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0, @ANYBLOB]) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0xc000, 0x4) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000180)={{0x0, 0x7, 0x80000000, 0x1, 0x6, 0x100000000, 0x4, 0x3, 0x9, 0x3cb2, 0x3, 0x800, 0x5, 0x2, 0x9}}) (async) openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x100, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:09 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000000c0)) (async) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) pselect6(0x40, &(0x7f0000000140)={0x82, 0x9, 0x7f, 0x4, 0xff, 0x100000000, 0x2, 0xcf10}, &(0x7f0000000180)={0x40, 0x8fd6, 0x1, 0xf6, 0x1b, 0x101, 0x0, 0x4}, &(0x7f00000001c0)={0x1fffffffc00000, 0x8, 0x80, 0x49b, 0x8001, 0xe012, 0x8, 0xfffffffffffff801}, &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x8001]}, 0x8}) 19:15:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8001, 0x8000, "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", 0x5, 0x7, 0x3f, 0x20, 0x1, 0x80, 0x9}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:09 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) 19:15:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) read$proc_mixer(r1, &(0x7f00000000c0)=""/4096, 0x1000) 19:15:09 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x80000000, 0x8001, "c7f3c71f9998fb0ed5498e0d7b2b953d3fde7112e1df4ad81830849d6a87843886ca61424957eb3591b8f0f0a4f90d4e48310457aa29eaef856488fdc5c96dca5772d8ceb35b676f9d2559c4d8952bd233696e71989ee32299ecfb2c04961720103b0441150c5597294507b46a45237c68d042dbc854b4ba87f065ba0ff592f4ab9a58dc9c9b32c882883ceab636b64609b2e05fb5fc8b184d07115ca8b81afc70e851c4796f1656ef41c6e92c2ad9a981952aa5b79a64432479cd430cd612ede9a2202b4ed2e7025d1582693f6e0db055b9afac3146186f84f554caa6bed3cf4371bb07eb2d713bc7d1fbd0dc227b6025b8d9ef5734e070379beed0e43e182e", 0x7, 0xff, 0x1, 0x8, 0xc7, 0x8, 0x8}}}, 0x120) write$smackfs_label(r0, &(0x7f0000000000)={'/dev/ubi_ctrl\x00'}, 0xf) pselect6(0x40, &(0x7f0000000040)={0x0, 0x100000}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) epoll_create(0x101) 19:15:09 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$sequencer(r0, &(0x7f0000000180)=[@l={0x92, 0x0, 0xc0, 0x5, 0x40, 0x7f, 0x401}, @x={0x94, 0x9, "673f95878dec"}, @v={0x93, 0xc, 0x90, 0x1d, @MIDI_NOTEON=@special, 0xfe, 0x3f}, @echo=0x484a, @l={0x92, 0xa, 0xd0, 0x3, 0x20, 0x1, 0x8001}, @s={0x5, @generic=0xff, 0xb, 0xfc}], 0x28) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x28000, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r5, 0xee00}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) write$sequencer(r0, &(0x7f0000000180)=[@l={0x92, 0x0, 0xc0, 0x5, 0x40, 0x7f, 0x401}, @x={0x94, 0x9, "673f95878dec"}, @v={0x93, 0xc, 0x90, 0x1d, @MIDI_NOTEON=@special, 0xfe, 0x3f}, @echo=0x484a, @l={0x92, 0xa, 0xd0, 0x3, 0x20, 0x1, 0x8001}, @s={0x5, @generic=0xff, 0xb, 0xfc}], 0x28) (async) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x28000, 0x0) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x0, 0xee00}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0xee01, 0xee01}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {r5, 0xee00}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8001, 0x8000, "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", 0x5, 0x7, 0x3f, 0x20, 0x1, 0x80, 0x9}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r2}}, 0x38) 19:15:09 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async, rerun: 32) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0x0) (rerun: 32) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:10 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x80000000, 0x8001, "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", 0x7, 0xff, 0x1, 0x8, 0xc7, 0x8, 0x8}}}, 0x120) (async) write$smackfs_label(r0, &(0x7f0000000000)={'/dev/ubi_ctrl\x00'}, 0xf) (async) pselect6(0x40, &(0x7f0000000040)={0x0, 0x100000}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) epoll_create(0x101) 19:15:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (rerun: 64) read$proc_mixer(r1, &(0x7f00000000c0)=""/4096, 0x1000) 19:15:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000280), 0x4900, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0xffffff9e, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r5, 0xd}}, 0x10) 19:15:10 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) read$proc_mixer(r1, &(0x7f00000000c0)=""/4096, 0x1000) 19:15:10 executing program 4: r0 = syz_io_uring_setup(0x1dd8, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r0, 0x13, &(0x7f0000000140)=[0x7], 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x101}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x6000) renameat(r3, &(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00') 19:15:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) write$smackfs_ptrace(r2, &(0x7f00000000c0)=0x1, 0x14) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e24, 0xfc8, @local, 0xc192}, r1}}, 0x38) 19:15:10 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x80000000, 0x8001, "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", 0x7, 0xff, 0x1, 0x8, 0xc7, 0x8, 0x8}}}, 0x120) write$smackfs_label(r0, &(0x7f0000000000)={'/dev/ubi_ctrl\x00'}, 0xf) pselect6(0x40, &(0x7f0000000040)={0x0, 0x100000}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) epoll_create(0x101) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x80000000, 0x8001, "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", 0x7, 0xff, 0x1, 0x8, 0xc7, 0x8, 0x8}}}, 0x120) (async) write$smackfs_label(r0, &(0x7f0000000000)={'/dev/ubi_ctrl\x00'}, 0xf) (async) pselect6(0x40, &(0x7f0000000040)={0x0, 0x100000}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) epoll_create(0x101) (async) 19:15:10 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000280), 0x4900, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0xffffff9e, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r5, 0xd}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r5, 0xd}}, 0x10) 19:15:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:10 executing program 0: unlinkat(0xffffffffffffff9c, &(0x7f0000002480)='./file0\x00', 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000040)=""/145, 0x91}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)}, {&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/157, 0x9d}, {&(0x7f0000001340)=""/117, 0x75}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x8) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000001140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000002440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:15:10 executing program 4: r0 = syz_io_uring_setup(0x1dd8, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r0, 0x13, &(0x7f0000000140)=[0x7], 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x101}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x101}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x6000) renameat(r3, &(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00') (async) renameat(r3, &(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00') 19:15:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) write$smackfs_ptrace(r2, &(0x7f00000000c0)=0x1, 0x14) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e24, 0xfc8, @local, 0xc192}, r1}}, 0x38) (rerun: 32) 19:15:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$userio(0xffffffffffffff9c, &(0x7f0000000280), 0x4900, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0xffffff9e, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r5, 0xd}}, 0x10) 19:15:10 executing program 0: unlinkat(0xffffffffffffff9c, &(0x7f0000002480)='./file0\x00', 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000040)=""/145, 0x91}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)}, {&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/157, 0x9d}, {&(0x7f0000001340)=""/117, 0x75}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x8) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000001140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000002440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:15:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) write$smackfs_ptrace(r2, &(0x7f00000000c0)=0x1, 0x14) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e24, 0xfc8, @local, 0xc192}, r1}}, 0x38) (rerun: 64) 19:15:10 executing program 4: r0 = syz_io_uring_setup(0x1dd8, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r0, 0x13, &(0x7f0000000140)=[0x7], 0x2) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x101}}, './file0\x00'}) (async, rerun: 64) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x6000) renameat(r3, &(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00') 19:15:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x94242, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @broadcast}}}, 0xa0) 19:15:10 executing program 0: unlinkat(0xffffffffffffff9c, &(0x7f0000002480)='./file0\x00', 0x0) (async, rerun: 64) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) (rerun: 64) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000040)=""/145, 0x91}, {&(0x7f0000000100)=""/3, 0x3}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)}, {&(0x7f0000001180)=""/193, 0xc1}, {&(0x7f0000001280)=""/157, 0x9d}, {&(0x7f0000001340)=""/117, 0x75}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x8) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000001140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000002440)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:15:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000)=@unlock_all, 0xb) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r0}}, 0x38) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e20, 0x3, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7}, r0}}, 0x38) 19:15:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x94242, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @broadcast}}}, 0xa0) 19:15:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000)=@unlock_all, 0xb) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (rerun: 32) 19:15:10 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x3f}}, './file0\x00'}) r2 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:15:10 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x0) 19:15:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x94242, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @broadcast}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x94242, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x2, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @broadcast}}}, 0xa0) (async) 19:15:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000)=@unlock_all, 0xb) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:10 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x3f}}, './file0\x00'}) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r2 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:15:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r0}}, 0x38) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e20, 0x3, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7}, r0}}, 0x38) 19:15:10 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x0) 19:15:10 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x3f}}, './file0\x00'}) r2 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r2, 0x0, 0xb9) 19:15:10 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffffe}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x80010000, 0x4, "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", 0x6, 0x8, 0x3, 0xf7, 0x40, 0xff, 0x3f}}}, 0x120) 19:15:10 executing program 2: openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) getdents(r1, &(0x7f00000000c0)=""/151, 0x97) 19:15:10 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r0}}, 0x38) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e20, 0x3, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7}, r0}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r0}}, 0x38) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e20, 0x3, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7}, r0}}, 0x38) (async) 19:15:10 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x0) (async) 19:15:10 executing program 2: openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) getdents(r1, &(0x7f00000000c0)=""/151, 0x97) 19:15:10 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x40000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) pselect6(0x40, &(0x7f0000000000)={0x22800000000, 0x0, 0x80, 0x7f, 0x80, 0x6, 0x9}, &(0x7f00000000c0)={0x6, 0x9, 0x9, 0x2, 0x0, 0x4, 0x100000001, 0x2}, &(0x7f0000000140)={0x57e, 0xfffffffffffff801, 0x80, 0x1, 0x737a3e59, 0x4, 0xffff, 0x8000000000000001}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x1f]}, 0x8}) 19:15:11 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffffe}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x80010000, 0x4, "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", 0x6, 0x8, 0x3, 0xf7, 0x40, 0xff, 0x3f}}}, 0x120) 19:15:11 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x40000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x22800000000, 0x0, 0x80, 0x7f, 0x80, 0x6, 0x9}, &(0x7f00000000c0)={0x6, 0x9, 0x9, 0x2, 0x0, 0x4, 0x100000001, 0x2}, &(0x7f0000000140)={0x57e, 0xfffffffffffff801, 0x80, 0x1, 0x737a3e59, 0x4, 0xffff, 0x8000000000000001}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x1f]}, 0x8}) 19:15:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) 19:15:11 executing program 2: openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) getdents(r1, &(0x7f00000000c0)=""/151, 0x97) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) getdents(r1, &(0x7f00000000c0)=""/151, 0x97) (async) 19:15:11 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xfffffffffffffffe}, 0x10) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x80010000, 0x4, "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", 0x6, 0x8, 0x3, 0xf7, 0x40, 0xff, 0x3f}}}, 0x120) 19:15:11 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x40000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x22800000000, 0x0, 0x80, 0x7f, 0x80, 0x6, 0x9}, &(0x7f00000000c0)={0x6, 0x9, 0x9, 0x2, 0x0, 0x4, 0x100000001, 0x2}, &(0x7f0000000140)={0x57e, 0xfffffffffffff801, 0x80, 0x1, 0x737a3e59, 0x4, 0xffff, 0x8000000000000001}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x1f]}, 0x8}) 19:15:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) 19:15:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) 19:15:11 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) 19:15:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x6, 0xffff, "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", 0x7, 0x3, 0xff, 0x2, 0x9, 0x80, 0x18, 0x1}}}, 0x120) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r1, 0xe, &(0x7f0000001800)={0x3f, 0x0, &(0x7f0000001700)=[{&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/179, 0xb3}, {&(0x7f00000003c0)=""/168, 0xa8}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/66, 0x42}, {&(0x7f0000001d40)=""/4091, 0xffb}, {&(0x7f0000000080)=""/21, 0x15}, {&(0x7f0000001500)=""/12, 0xc}, {&(0x7f0000001540)=""/246, 0xf6}, {&(0x7f0000001840)=""/138, 0x8a}], &(0x7f00000017c0)=[0x0, 0x1, 0x3ff, 0x8000, 0x3], 0xa}, 0x20) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000001640)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000002f80)=[{&(0x7f0000001680)=""/105, 0x69}, {&(0x7f0000001900)=""/183, 0xb7}, {&(0x7f00000019c0)=""/131, 0x83}, {&(0x7f0000001a80)=""/107, 0x6b}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c00)=""/26, 0x1a}, {&(0x7f0000001c40)=""/65, 0x41}, {&(0x7f0000002d40)=""/228, 0xe4}, {&(0x7f0000002e40)=""/151, 0x97}, {&(0x7f0000002f00)=""/119, 0x77}], 0xa) 19:15:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) 19:15:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) 19:15:11 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) 19:15:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xf}}, 0x10) 19:15:11 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) 19:15:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x6, 0xffff, "3ed40d1c27379de9d920e6abc0d7f1b3e483747bbcf2346e9f3744cfaa3612a98e9554915f850706e29866ba44a1c2464017cae7571f42c0a22c9f7b44516561caadb220c6172102c9c1af0fbd93344a2df0f86b4b356977cfc3caaaee92204ce743a1b39b88a15a23720f2382dc034721ab6368516a9a581bc24598d15d3df05e18ac8f5f4fb34d4e8f233d89326121be4306dd6a96797d6d3d585e31f2797beeb1663f1eb0824ffcc9e380b4eccfad4a8fe277581e63cf7e4f0e3530887dacdd49e5f03d0b27aec358d37dc98a29fc0a6ba9a7b2e31c364cf6d0d815d0bd6ec9136bfe80283c2fcf5df186c098e4311740110b3831bfd016d33d1150e6cb42", 0x7, 0x3, 0xff, 0x2, 0x9, 0x80, 0x18, 0x1}}}, 0x120) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r1, 0xe, &(0x7f0000001800)={0x3f, 0x0, &(0x7f0000001700)=[{&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/179, 0xb3}, {&(0x7f00000003c0)=""/168, 0xa8}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/66, 0x42}, {&(0x7f0000001d40)=""/4091, 0xffb}, {&(0x7f0000000080)=""/21, 0x15}, {&(0x7f0000001500)=""/12, 0xc}, {&(0x7f0000001540)=""/246, 0xf6}, {&(0x7f0000001840)=""/138, 0x8a}], &(0x7f00000017c0)=[0x0, 0x1, 0x3ff, 0x8000, 0x3], 0xa}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000001640)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000002f80)=[{&(0x7f0000001680)=""/105, 0x69}, {&(0x7f0000001900)=""/183, 0xb7}, {&(0x7f00000019c0)=""/131, 0x83}, {&(0x7f0000001a80)=""/107, 0x6b}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c00)=""/26, 0x1a}, {&(0x7f0000001c40)=""/65, 0x41}, {&(0x7f0000002d40)=""/228, 0xe4}, {&(0x7f0000002e40)=""/151, 0x97}, {&(0x7f0000002f00)=""/119, 0x77}], 0xa) 19:15:11 executing program 2: ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @auto="ae2c8a696109004f"}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x200, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r2, r3}}, './file0/file0\x00'}) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/55, 0x37}, {&(0x7f0000000540)=""/229, 0xe5}, {&(0x7f0000000640)=""/120, 0x78}], 0x5) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) epoll_wait(r4, &(0x7f00000002c0), 0x0, 0xa70) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$khugepaged_scan(r6, &(0x7f0000000300), 0x8) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000000740)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x568d, "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", 0x0, 0x1f, 0x1, 0x4, 0x7f, 0x2, 0x3, 0x1}}}, 0x128) 19:15:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x6, 0xffff, "3ed40d1c27379de9d920e6abc0d7f1b3e483747bbcf2346e9f3744cfaa3612a98e9554915f850706e29866ba44a1c2464017cae7571f42c0a22c9f7b44516561caadb220c6172102c9c1af0fbd93344a2df0f86b4b356977cfc3caaaee92204ce743a1b39b88a15a23720f2382dc034721ab6368516a9a581bc24598d15d3df05e18ac8f5f4fb34d4e8f233d89326121be4306dd6a96797d6d3d585e31f2797beeb1663f1eb0824ffcc9e380b4eccfad4a8fe277581e63cf7e4f0e3530887dacdd49e5f03d0b27aec358d37dc98a29fc0a6ba9a7b2e31c364cf6d0d815d0bd6ec9136bfe80283c2fcf5df186c098e4311740110b3831bfd016d33d1150e6cb42", 0x7, 0x3, 0xff, 0x2, 0x9, 0x80, 0x18, 0x1}}}, 0x120) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r1, 0xe, &(0x7f0000001800)={0x3f, 0x0, &(0x7f0000001700)=[{&(0x7f0000000240)=""/151, 0x97}, {&(0x7f0000000300)=""/179, 0xb3}, {&(0x7f00000003c0)=""/168, 0xa8}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/66, 0x42}, {&(0x7f0000001d40)=""/4091, 0xffb}, {&(0x7f0000000080)=""/21, 0x15}, {&(0x7f0000001500)=""/12, 0xc}, {&(0x7f0000001540)=""/246, 0xf6}, {&(0x7f0000001840)=""/138, 0x8a}], &(0x7f00000017c0)=[0x0, 0x1, 0x3ff, 0x8000, 0x3], 0xa}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000001640)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0\x00'}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000002f80)=[{&(0x7f0000001680)=""/105, 0x69}, {&(0x7f0000001900)=""/183, 0xb7}, {&(0x7f00000019c0)=""/131, 0x83}, {&(0x7f0000001a80)=""/107, 0x6b}, {&(0x7f0000001b00)=""/213, 0xd5}, {&(0x7f0000001c00)=""/26, 0x1a}, {&(0x7f0000001c40)=""/65, 0x41}, {&(0x7f0000002d40)=""/228, 0xe4}, {&(0x7f0000002e40)=""/151, 0x97}, {&(0x7f0000002f00)=""/119, 0x77}], 0xa) 19:15:11 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:11 executing program 2: ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @auto="ae2c8a696109004f"}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x200, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r2, r3}}, './file0/file0\x00'}) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/55, 0x37}, {&(0x7f0000000540)=""/229, 0xe5}, {&(0x7f0000000640)=""/120, 0x78}], 0x5) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) epoll_wait(r4, &(0x7f00000002c0), 0x0, 0xa70) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$khugepaged_scan(r6, &(0x7f0000000300), 0x8) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000000740)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x568d, "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", 0x0, 0x1f, 0x1, 0x4, 0x7f, 0x2, 0x3, 0x1}}}, 0x128) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @auto="ae2c8a696109004f"}}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x200, &(0x7f0000000100)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r2, r3}}, './file0/file0\x00'}) (async) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/55, 0x37}, {&(0x7f0000000540)=""/229, 0xe5}, {&(0x7f0000000640)=""/120, 0x78}], 0x5) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) (async) epoll_wait(r4, &(0x7f00000002c0), 0x0, 0xa70) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) write$khugepaged_scan(r6, &(0x7f0000000300), 0x8) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000000740)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x568d, "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", 0x0, 0x1f, 0x1, 0x4, 0x7f, 0x2, 0x3, 0x1}}}, 0x128) (async) 19:15:11 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 19:15:11 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000002c0)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) read$smackfs_cipsonum(r1, &(0x7f0000000080), 0x14) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="1a000000000000002e2f66696c65302f66696c653000"]) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x80000000, 0xa37, "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", 0x1f, 0x20, 0x40, 0x80, 0x3, 0x8, 0x1, 0x1}, r5}}, 0x120) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) 19:15:11 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 19:15:11 executing program 2: ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @auto="ae2c8a696109004f"}}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x200, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r2, r3}}, './file0/file0\x00'}) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/55, 0x37}, {&(0x7f0000000540)=""/229, 0xe5}, {&(0x7f0000000640)=""/120, 0x78}], 0x5) (async) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/55, 0x37}, {&(0x7f0000000540)=""/229, 0xe5}, {&(0x7f0000000640)=""/120, 0x78}], 0x5) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000240)}}, 0x18) epoll_wait(r4, &(0x7f00000002c0), 0x0, 0xa70) (async) epoll_wait(r4, &(0x7f00000002c0), 0x0, 0xa70) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$khugepaged_scan(r6, &(0x7f0000000300), 0x8) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000000740)={0x8, 0x120, 0xfa00, {0x1, {0x2, 0x568d, "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", 0x0, 0x1f, 0x1, 0x4, 0x7f, 0x2, 0x3, 0x1}}}, 0x128) 19:15:11 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000048c40)={{0x0, 0x3, 0x1, 0x1, 0x7, 0x6, 0x4, 0xfab, 0x3ff, 0x9e, 0x2, 0x9411, 0x1000, 0x3, 0x7fffffff}, 0x18, [0x0, 0x0, 0x0]}) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r3, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048d00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048f00)={0xffffffffffff33d2, [{0x0, 0x0}], 0x0, "92309fe2f917d2"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049f00)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "1ca5c4f3c01683"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004af00)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004b100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "fe613d68ea512a"}) r11 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r12, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r13 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r13, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r14, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r15 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r15, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r16, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004c100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x50, "13cb9fe8e86082"}) r18 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r18, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r19, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004d100)={0x38b7b347, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "bf96a1adc72b64"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004e100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "27de02811ccccc"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004f100)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {r3}, {r5}, {r6, r7}, {}, {}, {r8}, {r9}, {0x0, r10}, {r12}, {}, {r14}, {r16}, {}, {}, {}, {0x0, r17}, {}, {r19, r20}, {0x0, r21}], 0xf8, "f0a7f06a9ed414"}) 19:15:11 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000002c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) read$smackfs_cipsonum(r1, &(0x7f0000000080), 0x14) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="1a000000000000002e2f66696c65302f66696c653000"]) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x80000000, 0xa37, "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", 0x1f, 0x20, 0x40, 0x80, 0x3, 0x8, 0x1, 0x1}, r5}}, 0x120) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) 19:15:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e22, 0x7, @local, 0x60d4}}}, 0x38) 19:15:11 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000240)={0x1, 0x5}, 0x2) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) mount_setattr(r0, &(0x7f00000001c0)='./file0\x00', 0x8000, &(0x7f0000000200)={0x80, 0x100071, 0x1e0000, {r0}}, 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x27, 0x9, 0x80, 0x8, 0x1, 0x7, 0x47}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e22, 0x7, @local, 0x60d4}}}, 0x38) 19:15:12 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000002c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) read$smackfs_cipsonum(r1, &(0x7f0000000080), 0x14) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r4 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="1a000000000000002e2f66696c65302f66696c653000"]) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x80000000, 0xa37, "858732c26928e0d3c6f18df85a614528614b8e5d24c45b9e00f4a2741a67da8f8543b0804aa6ec81f2db1e63a284be0c9e2ebe862148724ec5a82b743c43cc306dec4319a0e0dc6db810fad3a54d0118acadac745fcc8fbdc853d36afeb3003086c0c7e30041e0e1569c9cc2d2b58fb2010259d0b227c0199310fa985d7b4b98e7d9af41b64956edacb0b105308c089465300bd2329868b63d4aba76458acafabd9025478ac3cc026ca3b2d88ced14bd99b0c2f06f96a53ee55e7c86a1e2005b5f4fa0d80a7c9721167d98a98a060c1bb064de7a43077319f76f97edc87016a7f70740414d0f76c2a8d4f6130822dddd9d6e50116c2c4b4ff03e53113b6a2e9f", 0x1f, 0x20, 0x40, 0x80, 0x3, 0x8, 0x1, 0x1}, r5}}, 0x120) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) 19:15:12 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000240)={0x1, 0x5}, 0x2) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) mount_setattr(r0, &(0x7f00000001c0)='./file0\x00', 0x8000, &(0x7f0000000200)={0x80, 0x100071, 0x1e0000, {r0}}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x27, 0x9, 0x80, 0x8, 0x1, 0x7, 0x47}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e22, 0x7, @local, 0x60d4}}}, 0x38) 19:15:12 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000048c40)={{0x0, 0x3, 0x1, 0x1, 0x7, 0x6, 0x4, 0xfab, 0x3ff, 0x9e, 0x2, 0x9411, 0x1000, 0x3, 0x7fffffff}, 0x18, [0x0, 0x0, 0x0]}) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r3, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048d00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048f00)={0xffffffffffff33d2, [{0x0, 0x0}], 0x0, "92309fe2f917d2"}) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049f00)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "1ca5c4f3c01683"}) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004af00)={0x0, ""/256, 0x0}) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004b100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "fe613d68ea512a"}) (rerun: 32) r11 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r12, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) r13 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r13, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r14, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) r15 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r15, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r16, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004c100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x50, "13cb9fe8e86082"}) (rerun: 32) r18 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r18, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r19, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async, rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004d100)={0x38b7b347, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "bf96a1adc72b64"}) (rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004e100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "27de02811ccccc"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004f100)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {r3}, {r5}, {r6, r7}, {}, {}, {r8}, {r9}, {0x0, r10}, {r12}, {}, {r14}, {r16}, {}, {}, {}, {0x0, r17}, {}, {r19, r20}, {0x0, r21}], 0xf8, "f0a7f06a9ed414"}) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e24, 0x1f, @remote, 0x8001}, r3}}, 0x38) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/95, 0x5f) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x28082, 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x6000, 0x100, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:12 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000240)={0x1, 0x5}, 0x2) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) mount_setattr(r0, &(0x7f00000001c0)='./file0\x00', 0x8000, &(0x7f0000000200)={0x80, 0x100071, 0x1e0000, {r0}}, 0x20) (async, rerun: 32) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (rerun: 32) write$FUSE_INIT(r1, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x27, 0x9, 0x80, 0x8, 0x1, 0x7, 0x47}}, 0x50) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/95, 0x5f) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x28082, 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x6000, 0x100, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/95, 0x5f) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x28082, 0x0) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x6000, 0x100, &(0x7f00000001c0)) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e24, 0x1f, @remote, 0x8001}, r3}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e24, 0x1f, @remote, 0x8001}, r3}}, 0x38) (async) 19:15:12 executing program 0: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x50, 0xffffffffffffffff, 0xbce2e000) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4100, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7, 0x1000, 0x5, 0x20000000000000, 0x400, 0xbad8, 0xffffffff, 0x7f, 0x7fffffff, 0xbc, 0x3619, 0xb9b, 0x9, 0x7f}}) 19:15:12 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000048c40)={{0x0, 0x3, 0x1, 0x1, 0x7, 0x6, 0x4, 0xfab, 0x3ff, 0x9e, 0x2, 0x9411, 0x1000, 0x3, 0x7fffffff}, 0x18, [0x0, 0x0, 0x0]}) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r3, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048d00)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048d00)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048f00)={0xffffffffffff33d2, [{0x0, 0x0}], 0x0, "92309fe2f917d2"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049f00)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "1ca5c4f3c01683"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004af00)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004af00)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004b100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "fe613d68ea512a"}) r11 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r12, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r12, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r13 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r13, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r13, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r14, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r15 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r15, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r16, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r16, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004c100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x50, "13cb9fe8e86082"}) r18 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r18, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r18, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r19, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r19, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004d100)={0x38b7b347, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "bf96a1adc72b64"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004e100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "27de02811ccccc"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004f100)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {r3}, {r5}, {r6, r7}, {}, {}, {r8}, {r9}, {0x0, r10}, {r12}, {}, {r14}, {r16}, {}, {}, {}, {0x0, r17}, {}, {r19, r20}, {0x0, r21}], 0xf8, "f0a7f06a9ed414"}) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/95, 0x5f) (async) read$ptp(0xffffffffffffffff, &(0x7f0000000140)=""/95, 0x5f) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x28082, 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x6000, 0x100, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e24, 0x1f, @remote, 0x8001}, r3}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e24, 0x1f, @remote, 0x8001}, r3}}, 0x38) (async) 19:15:12 executing program 0: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x50, 0xffffffffffffffff, 0xbce2e000) (async, rerun: 32) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4100, 0x0) (rerun: 32) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7, 0x1000, 0x5, 0x20000000000000, 0x400, 0xbad8, 0xffffffff, 0x7f, 0x7fffffff, 0xbc, 0x3619, 0xb9b, 0x9, 0x7f}}) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="7ac80000000000000000000000003000"]) write$RDMA_USER_CM_CMD_NOTIFY(r1, 0xfffffffffffffffe, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x541b, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000100)='2\x00', 0x2) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x10060, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x45) 19:15:12 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x188000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x3}}, 0x20) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="7ac80000000000000000000000003000"]) write$RDMA_USER_CM_CMD_NOTIFY(r1, 0xfffffffffffffffe, 0x0) (async) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x541b, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000100)='2\x00', 0x2) (async) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x10060, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x45) 19:15:12 executing program 0: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x50, 0xffffffffffffffff, 0xbce2e000) (async) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x4100, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000040)={{0x0, 0x7, 0x1000, 0x5, 0x20000000000000, 0x400, 0xbad8, 0xffffffff, 0x7f, 0x7fffffff, 0xbc, 0x3619, 0xb9b, 0x9, 0x7f}}) 19:15:12 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x188000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x3}}, 0x20) 19:15:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="7ac80000000000000000000000003000"]) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="7ac80000000000000000000000003000"]) write$RDMA_USER_CM_CMD_NOTIFY(r1, 0xfffffffffffffffe, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, 0xfffffffffffffffe, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x541b, 0x0) write$yama_ptrace_scope(r1, &(0x7f0000000100)='2\x00', 0x2) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x10060, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x45) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x3}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x4, 0x0, 0x13f, 0x3}}, 0x20) (async) 19:15:12 executing program 0: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x13, r0, 0x8000000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={r1, r2+60000000}, 0x0) 19:15:12 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x188000) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:12 executing program 2: io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(0xffffffffffffffff, 0x13, &(0x7f0000000000)=[0xffffffec, 0x4], 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000002140)={0xa0, 0x0, r1, {{0x6, 0x2, 0x2, 0x10001, 0xffff, 0x200, {0x6, 0x9, 0x9, 0x21b4, 0x7, 0x909, 0x2, 0x9, 0xc0, 0x1000, 0x0, 0x0, 0xee01, 0x5, 0xaa0f}}, {0x0, 0x8}}}, 0xa0) 19:15:12 executing program 0: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x13, r0, 0x8000000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={r1, r2+60000000}, 0x0) 19:15:12 executing program 1: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000002140)={0xa0, 0x0, r1, {{0x6, 0x2, 0x2, 0x10001, 0xffff, 0x200, {0x6, 0x9, 0x9, 0x21b4, 0x7, 0x909, 0x2, 0x9, 0xc0, 0x1000, 0x0, 0x0, 0xee01, 0x5, 0xaa0f}}, {0x0, 0x8}}}, 0xa0) 19:15:13 executing program 2: io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(0xffffffffffffffff, 0x13, &(0x7f0000000000)=[0xffffffec, 0x4], 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 19:15:13 executing program 1: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:13 executing program 0: ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x13, r0, 0x8000000) (async) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={r1, r2+60000000}, 0x0) 19:15:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000002140)={0xa0, 0x0, r1, {{0x6, 0x2, 0x2, 0x10001, 0xffff, 0x200, {0x6, 0x9, 0x9, 0x21b4, 0x7, 0x909, 0x2, 0x9, 0xc0, 0x1000, 0x0, 0x0, 0xee01, 0x5, 0xaa0f}}, {0x0, 0x8}}}, 0xa0) 19:15:13 executing program 1: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:13 executing program 2: io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(0xffffffffffffffff, 0x13, &(0x7f0000000000)=[0xffffffec, 0x4], 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) 19:15:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x7ff, "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", 0x8, 0x5, 0x1, 0x20, 0x1, 0x4, 0xff}, r3}}, 0x128) 19:15:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1}}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 19:15:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x7ff, "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", 0x8, 0x5, 0x1, 0x20, 0x1, 0x4, 0xff}, r3}}, 0x128) 19:15:13 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x182, 0x0) pselect6(0x40, &(0x7f0000000080)={0x8a09, 0x1, 0x20, 0x6, 0x61d9, 0xffffffffffffffff, 0x6, 0xfffffffffffffc00}, &(0x7f0000000140)={0x8000000000000000, 0xfffffffffffffffc, 0x1, 0x0, 0x8332, 0x8000000000000000, 0x8, 0x7fffffff}, &(0x7f0000000180)={0x3, 0x6, 0x7ff, 0x0, 0x4, 0x5, 0x0, 0x1ff}, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x8]}, 0x8}) 19:15:13 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x6902, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x40080, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) read$snapshot(r4, &(0x7f00000002c0)=""/100, 0x64) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x39}}, './file1\x00'}) mount_setattr(r3, &(0x7f0000000200)='./file0\x00', 0x8000, &(0x7f0000000280)={0xc, 0x80, 0x20000, {r5}}, 0x20) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r7 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x161100, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000180)={0x1, 0x1}, 0x2) fstat(r7, &(0x7f0000000100)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, 0x0) 19:15:13 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1}}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 19:15:13 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x182, 0x0) (async) pselect6(0x40, &(0x7f0000000080)={0x8a09, 0x1, 0x20, 0x6, 0x61d9, 0xffffffffffffffff, 0x6, 0xfffffffffffffc00}, &(0x7f0000000140)={0x8000000000000000, 0xfffffffffffffffc, 0x1, 0x0, 0x8332, 0x8000000000000000, 0x8, 0x7fffffff}, &(0x7f0000000180)={0x3, 0x6, 0x7ff, 0x0, 0x4, 0x5, 0x0, 0x1ff}, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x8]}, 0x8}) 19:15:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r1}}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 19:15:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x7ff, "5fcf035a6dcca52ae71740d535e2a9cc5c656ea273038b028f277ac7dd445e575bc9c7fbf8e7f1751171463daa392bf0cad227d9b2041fd29c3a1ff1be557ab8c61f2e6fe4456bae55bbb439ace2ed9261017063c850fee795027970c0e9c6db84f569c20f0e163ca81772ddc2c4c1af0aa95cc5146c08b1e6b1308e536b3993396508dd371afc1001cea8663ad1dddb4776adccf726bcdd0bd239f773f21d72e424c2f0aa18f46db77992cc598780f9baaac29e67fa2cea8cdd045097c7320efb4631cf43872d13dbbe259d002e07179aa17eb151eb6984570c4c5855e881d491228b92a137b6382f77af9f16dbef07dc32af7173233ed482813bda721522e9", 0x8, 0x5, 0x1, 0x20, 0x1, 0x4, 0xff}, r3}}, 0x128) 19:15:13 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x182, 0x0) pselect6(0x40, &(0x7f0000000080)={0x8a09, 0x1, 0x20, 0x6, 0x61d9, 0xffffffffffffffff, 0x6, 0xfffffffffffffc00}, &(0x7f0000000140)={0x8000000000000000, 0xfffffffffffffffc, 0x1, 0x0, 0x8332, 0x8000000000000000, 0x8, 0x7fffffff}, &(0x7f0000000180)={0x3, 0x6, 0x7ff, 0x0, 0x4, 0x5, 0x0, 0x1ff}, &(0x7f00000001c0)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0x8]}, 0x8}) 19:15:13 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) 19:15:13 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x6902, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x40080, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) read$snapshot(r4, &(0x7f00000002c0)=""/100, 0x64) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x39}}, './file1\x00'}) mount_setattr(r3, &(0x7f0000000200)='./file0\x00', 0x8000, &(0x7f0000000280)={0xc, 0x80, 0x20000, {r5}}, 0x20) (async) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) r7 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x161100, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000180)={0x1, 0x1}, 0x2) (async) fstat(r7, &(0x7f0000000100)) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, 0x0) 19:15:13 executing program 0: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) write$smackfs_labels_list(0xffffffffffffffff, &(0x7f00000001c0)={[{'^^,'}, {'/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {'.p[#/:'}, {'/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {'[-.&}'}]}, 0x9c) 19:15:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@FILEID_NILFS_WITH_PARENT={0x20}, &(0x7f00000000c0), 0x1600) r6 = io_uring_setup(0x26b7, &(0x7f00000003c0)={0x0, 0x48fb, 0x400, 0x1, 0x145, 0x0, r3}) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000540)={&(0x7f0000002000)={[{&(0x7f0000000440)="f31367542c080aa14a488415e196f1956f5312d98d", 0x15, 0x3}, {&(0x7f0000000480)="46ef546bb8c8c85246d06bce6279248719c9936383f7753a66c5bd080c037eed6abb5f19eb9b0c1f46fcda598e803db8792cd2fcb5f2e566c27025dd9a2f2a06635fbf4ce02b7784c5a51e5e3cf1eb4c0efea94780c6ed60d4f3d8b5e249953d064ae08f909015ee4cbdd362bcc50f2450a22380cde732e18d8f352afed565dcb54a280f667597f7308c1b908d6b81c9510d44faa01ca9d8c50d70d3900684f80a6ba3c2783704d1080a84ad92f3fe13984f5b0b", 0xb4}]}, 0x2, 0x2}, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYBLOB="01fe04000000", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653000"]) read$snapshot(r3, &(0x7f0000000580)=""/184, 0xb8) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x3, {0xa, 0x4e21, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x400}, r2}}, 0x38) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000002, 0x50, r4, 0xafc7c000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100ff076d0c0159510e79238214f985cd800c00f7c9d49a30c71cdebf850c63b1f11dff", @ANYRES32, @ANYBLOB="01000000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, r2, 0x1c, 0x0, @in={0x2, 0x4e24, @multicast2}}}, 0xa0) 19:15:13 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) 19:15:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@FILEID_NILFS_WITH_PARENT={0x20}, &(0x7f00000000c0), 0x1600) r6 = io_uring_setup(0x26b7, &(0x7f00000003c0)={0x0, 0x48fb, 0x400, 0x1, 0x145, 0x0, r3}) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000540)={&(0x7f0000002000)={[{&(0x7f0000000440)="f31367542c080aa14a488415e196f1956f5312d98d", 0x15, 0x3}, {&(0x7f0000000480)="46ef546bb8c8c85246d06bce6279248719c9936383f7753a66c5bd080c037eed6abb5f19eb9b0c1f46fcda598e803db8792cd2fcb5f2e566c27025dd9a2f2a06635fbf4ce02b7784c5a51e5e3cf1eb4c0efea94780c6ed60d4f3d8b5e249953d064ae08f909015ee4cbdd362bcc50f2450a22380cde732e18d8f352afed565dcb54a280f667597f7308c1b908d6b81c9510d44faa01ca9d8c50d70d3900684f80a6ba3c2783704d1080a84ad92f3fe13984f5b0b", 0xb4}]}, 0x2, 0x2}, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYBLOB="01fe04000000", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653000"]) read$snapshot(r3, &(0x7f0000000580)=""/184, 0xb8) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x3, {0xa, 0x4e21, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x400}, r2}}, 0x38) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000002, 0x50, r4, 0xafc7c000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100ff076d0c0159510e79238214f985cd800c00f7c9d49a30c71cdebf850c63b1f11dff", @ANYRES32, @ANYBLOB="01000000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, r2, 0x1c, 0x0, @in={0x2, 0x4e24, @multicast2}}}, 0xa0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) (async) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@FILEID_NILFS_WITH_PARENT={0x20}, &(0x7f00000000c0), 0x1600) (async) io_uring_setup(0x26b7, &(0x7f00000003c0)={0x0, 0x48fb, 0x400, 0x1, 0x145, 0x0, r3}) (async) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000540)={&(0x7f0000002000)={[{&(0x7f0000000440)="f31367542c080aa14a488415e196f1956f5312d98d", 0x15, 0x3}, {&(0x7f0000000480)="46ef546bb8c8c85246d06bce6279248719c9936383f7753a66c5bd080c037eed6abb5f19eb9b0c1f46fcda598e803db8792cd2fcb5f2e566c27025dd9a2f2a06635fbf4ce02b7784c5a51e5e3cf1eb4c0efea94780c6ed60d4f3d8b5e249953d064ae08f909015ee4cbdd362bcc50f2450a22380cde732e18d8f352afed565dcb54a280f667597f7308c1b908d6b81c9510d44faa01ca9d8c50d70d3900684f80a6ba3c2783704d1080a84ad92f3fe13984f5b0b", 0xb4}]}, 0x2, 0x2}, 0x1) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYBLOB="01fe04000000", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653000"]) (async) read$snapshot(r3, &(0x7f0000000580)=""/184, 0xb8) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x3, {0xa, 0x4e21, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x400}, r2}}, 0x38) (async) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000002, 0x50, r4, 0xafc7c000) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100ff076d0c0159510e79238214f985cd800c00f7c9d49a30c71cdebf850c63b1f11dff", @ANYRES32, @ANYBLOB="01000000000000002e2f66696c653000"]) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, r2, 0x1c, 0x0, @in={0x2, 0x4e24, @multicast2}}}, 0xa0) (async) 19:15:13 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) 19:15:13 executing program 0: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) (async, rerun: 32) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async, rerun: 32) write$smackfs_labels_list(0xffffffffffffffff, &(0x7f00000001c0)={[{'^^,'}, {'/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {'.p[#/:'}, {'/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {'[-.&}'}]}, 0x9c) 19:15:13 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x6902, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x40080, 0x0) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) read$snapshot(r4, &(0x7f00000002c0)=""/100, 0x64) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x39}}, './file1\x00'}) mount_setattr(r3, &(0x7f0000000200)='./file0\x00', 0x8000, &(0x7f0000000280)={0xc, 0x80, 0x20000, {r5}}, 0x20) (async) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) (async) r7 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x161100, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000180)={0x1, 0x1}, 0x2) (async) fstat(r7, &(0x7f0000000100)) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r6, 0xc0709411, 0x0) 19:15:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async, rerun: 32) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async, rerun: 32) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@FILEID_NILFS_WITH_PARENT={0x20}, &(0x7f00000000c0), 0x1600) (async) r6 = io_uring_setup(0x26b7, &(0x7f00000003c0)={0x0, 0x48fb, 0x400, 0x1, 0x145, 0x0, r3}) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000540)={&(0x7f0000002000)={[{&(0x7f0000000440)="f31367542c080aa14a488415e196f1956f5312d98d", 0x15, 0x3}, {&(0x7f0000000480)="46ef546bb8c8c85246d06bce6279248719c9936383f7753a66c5bd080c037eed6abb5f19eb9b0c1f46fcda598e803db8792cd2fcb5f2e566c27025dd9a2f2a06635fbf4ce02b7784c5a51e5e3cf1eb4c0efea94780c6ed60d4f3d8b5e249953d064ae08f909015ee4cbdd362bcc50f2450a22380cde732e18d8f352afed565dcb54a280f667597f7308c1b908d6b81c9510d44faa01ca9d8c50d70d3900684f80a6ba3c2783704d1080a84ad92f3fe13984f5b0b", 0xb4}]}, 0x2, 0x2}, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYBLOB="01fe04000000", @ANYRES32=r5, @ANYBLOB="02000000000000002e2f66696c653000"]) (async, rerun: 64) read$snapshot(r3, &(0x7f0000000580)=""/184, 0xb8) (rerun: 64) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x3, {0xa, 0x4e21, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x400}, r2}}, 0x38) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000002, 0x50, r4, 0xafc7c000) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100ff076d0c0159510e79238214f985cd800c00f7c9d49a30c71cdebf850c63b1f11dff", @ANYRES32, @ANYBLOB="01000000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, r2, 0x1c, 0x0, @in={0x2, 0x4e24, @multicast2}}}, 0xa0) 19:15:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB=',smackfsdef=d'], 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:14 executing program 0: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) (async) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) write$smackfs_labels_list(0xffffffffffffffff, &(0x7f00000001c0)={[{'^^,'}, {'/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {'.p[#/:'}, {'/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00'}, {'[-.&}'}]}, 0x9c) 19:15:14 executing program 3: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000040)={0x2a, 0x6, 0x0, {0x5, 0x0, 0x1, 0x0, '\x00'}}, 0x2a) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB=',smackfsdef=d'], 0x0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:14 executing program 3: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000040)={0x2a, 0x6, 0x0, {0x5, 0x0, 0x1, 0x0, '\x00'}}, 0x2a) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 19:15:14 executing program 3: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000040)={0x2a, 0x6, 0x0, {0x5, 0x0, 0x1, 0x0, '\x00'}}, 0x2a) (async) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000040)={0x2a, 0x6, 0x0, {0x5, 0x0, 0x1, 0x0, '\x00'}}, 0x2a) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB=',smackfsdef=d'], 0x0, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB=',smackfsdef=d'], 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (rerun: 64) 19:15:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0x9, "d7862651444b53420598e9a873d661c74b054f0388b18610c9800dbe4414e5bb62a7ab3d3876e7791c234d0e02a2dfa34f64834a7a7fc90c25793ada6f649f887993ec914b9a166858936cd7b152ff5d7295daa2f37433d65bd27359b47e38811c403ee061fdcd35e7e626a4bbc38c99ae914b84e64dc1be04797163474fe5e4f078922dbbf844efe234742915be3fedc0a5133a75b2f1cf6c9c9f9a51ec47eb9f87f1bed84c44159fdd2ac633577d0dfa0874ed5436a7696773fa471f3cfb0cc0d51f2809e1271f2208212abb1e13a0196dd006f6800411945770319ed20a08d2a01bfa42e5a5d28f6ec3518e6040d23514400e1165faa2b0887600", 0x7, 0xde, 0x1, 0x2, 0x4, 0x5, 0x6}, r2}}, 0x128) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$capi20(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x9, 0x83, 0x82, 0x3, 0x1}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000000), 0x48040, 0x10) 19:15:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0x9, "d7862651444b53420598e9a873d661c74b054f0388b18610c9800dbe4414e5bb62a7ab3d3876e7791c234d0e02a2dfa34f64834a7a7fc90c25793ada6f649f887993ec914b9a166858936cd7b152ff5d7295daa2f37433d65bd27359b47e38811c403ee061fdcd35e7e626a4bbc38c99ae914b84e64dc1be04797163474fe5e4f078922dbbf844efe234742915be3fedc0a5133a75b2f1cf6c9c9f9a51ec47eb9f87f1bed84c44159fdd2ac633577d0dfa0874ed5436a7696773fa471f3cfb0cc0d51f2809e1271f2208212abb1e13a0196dd006f6800411945770319ed20a08d2a01bfa42e5a5d28f6ec3518e6040d23514400e1165faa2b0887600", 0x7, 0xde, 0x1, 0x2, 0x4, 0x5, 0x6}, r2}}, 0x128) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$capi20(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x9, 0x83, 0x82, 0x3, 0x1}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$capi20(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x9, 0x83, 0x82, 0x3, 0x1}, 0x10) (async) write$capi20(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x9, 0x83, 0x82, 0x3, 0x1}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 19:15:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000000), 0x48040, 0x10) 19:15:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0x9, "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", 0x7, 0xde, 0x1, 0x2, 0x4, 0x5, 0x6}, r2}}, 0x128) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000000000), 0x48040, 0x10) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0xa}}, 0x20) 19:15:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1cb002) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="2e015839bf43a70376f22f66696c7530005b92dafd0a42b6ffa46d5685a0bd02456a61a2efbc97e8ef379208b2655307777d12fa889f6e72b674ecfe8f5f4f41baae1bf2065077839a52729941d4c5b0987b1f540a3191d4b919da590759bec5e2c2b7bfeebe12579c1f8f93aaca8e0bb9872671ea86"]) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x3, {0x3, 0xffff8001, "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", 0x54, 0x8, 0xfd, 0x55, 0x5c, 0x3f, 0x2, 0x1}}}, 0x128) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x140001, 0x0) write$snapshot(r5, &(0x7f00000001c0)="d0df00dd63bbaee707318473a03e040000ec03", 0x13) 19:15:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x600200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 19:15:14 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1cb002) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="2e015839bf43a70376f22f66696c7530005b92dafd0a42b6ffa46d5685a0bd02456a61a2efbc97e8ef379208b2655307777d12fa889f6e72b674ecfe8f5f4f41baae1bf2065077839a52729941d4c5b0987b1f540a3191d4b919da590759bec5e2c2b7bfeebe12579c1f8f93aaca8e0bb9872671ea86"]) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x3, {0x3, 0xffff8001, "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", 0x54, 0x8, 0xfd, 0x55, 0x5c, 0x3f, 0x2, 0x1}}}, 0x128) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x140001, 0x0) write$snapshot(r5, &(0x7f00000001c0)="d0df00dd63bbaee707318473a03e040000ec03", 0x13) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1cb002) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="2e015839bf43a70376f22f66696c7530005b92dafd0a42b6ffa46d5685a0bd02456a61a2efbc97e8ef379208b2655307777d12fa889f6e72b674ecfe8f5f4f41baae1bf2065077839a52729941d4c5b0987b1f540a3191d4b919da590759bec5e2c2b7bfeebe12579c1f8f93aaca8e0bb9872671ea86"]) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x3, {0x3, 0xffff8001, "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", 0x54, 0x8, 0xfd, 0x55, 0x5c, 0x3f, 0x2, 0x1}}}, 0x128) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x140001, 0x0) (async) write$snapshot(r5, &(0x7f00000001c0)="d0df00dd63bbaee707318473a03e040000ec03", 0x13) (async) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0xa}}, 0x20) 19:15:14 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="3078303030303030303030303030303030333a3078303030303030303030303030303030333a3078303030303030303030303030303030333a3078303030303055ec3036663936343662373a307830303030303030313030e930303030313a3078666666666666666666666666663638613a3078303030303030303030303030303862333a3078303030303030303030303030303030387c5f959bed3065cd126b2f3138343436373434303733373039353434323933202f7379732f66732f736d61636b66732f69707636686f737400008a848a453fc5fc00f4dcca0cccb5f09425c11011e1"], 0xc7) write$smackfs_ipv6host(r0, 0x0, 0xb9) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{0x0, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000474c0)={0x0, ""/256, 0x0, 0x0}) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000476c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000478c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000047ac0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000047cc0)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x56, "283519237cae2c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000048cc0)={{0x0, 0x15d, 0x1, 0x1, 0xffff, 0x3, 0x5, 0x3, 0x10000, 0x0, 0x1, 0x4, 0x4, 0x6, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0xd02a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xff, "ba78f855d7d6f4"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004acc0)={0x0, ""/256, 0x0}) r14 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r15, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004aec0)={0x0, ""/256, 0x0, 0x0}) r17 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r19 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r19, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r20, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004b0c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b2c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r3}, {r5}, {0x0, r6}, {0x0, r7}, {r8}, {r9}, {r10, r11}, {r13}, {r15, r16}, {r18}, {r20, r21}], 0x9, "9b6a6d9e687dc4"}) 19:15:14 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x600200, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0xa}}, 0x20) 19:15:14 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 19:15:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0x8fa500000, 0xe7, 0x9, 0xffffbfffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000044080)={0x723aff4e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "87f6de641320bc"}) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r7, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000045080)={0x5e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "b89d6dfb332eb8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000046080)={0x400, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "0ff240062510c0"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000047080)={{0x0, 0x800, 0x2, 0x7, 0x0, 0x100000001, 0x7fff, 0xdfd1, 0x2, 0x3ff, 0x8, 0x3b449619, 0xbadf, 0x0, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048480)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048680)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048880)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048a80)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x91, "7440a7e2bf1da0"}) r17 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x361a40, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049c80)={0xeb1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "76e9da9a74a155"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004ac80)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004ae80)={0x5fb46972, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "0a73df4e65ca45"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c080)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {0x0, r3}, {}, {}, {}, {}, {r5}, {r7}, {}, {0x0, r8}, {}, {0x0, r9}, {}, {}, {r10}, {0x0, r11}, {r12}, {}, {0x0, r13}, {}, {r14}, {r15}, {}, {0x0, r16}, {r18}, {}, {0x0, r19}, {}, {}, {}, {r20, r21}], 0x5, "a856271a4d5e4f"}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) write$smackfs_logging(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:15 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="3078303030303030303030303030303030333a3078303030303030303030303030303030333a3078303030303030303030303030303030333a3078303030303055ec3036663936343662373a307830303030303030313030e930303030313a3078666666666666666666666666663638613a3078303030303030303030303030303862333a3078303030303030303030303030303030387c5f959bed3065cd126b2f3138343436373434303733373039353434323933202f7379732f66732f736d61636b66732f69707636686f737400008a848a453fc5fc00f4dcca0cccb5f09425c11011e1"], 0xc7) write$smackfs_ipv6host(r0, 0x0, 0xb9) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{0x0, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{0x0, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000474c0)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000474c0)={0x0, ""/256, 0x0, 0x0}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000476c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000478c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000047ac0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000047cc0)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x56, "283519237cae2c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000048cc0)={{0x0, 0x15d, 0x1, 0x1, 0xffff, 0x3, 0x5, 0x3, 0x10000, 0x0, 0x1, 0x4, 0x4, 0x6, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0xd02a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xff, "ba78f855d7d6f4"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004acc0)={0x0, ""/256, 0x0}) r14 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r15, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004aec0)={0x0, ""/256, 0x0, 0x0}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r17 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r19 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r19, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r20, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004b0c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b2c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r3}, {r5}, {0x0, r6}, {0x0, r7}, {r8}, {r9}, {r10, r11}, {r13}, {r15, r16}, {r18}, {r20, r21}], 0x9, "9b6a6d9e687dc4"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b2c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r3}, {r5}, {0x0, r6}, {0x0, r7}, {r8}, {r9}, {r10, r11}, {r13}, {r15, r16}, {r18}, {r20, r21}], 0x9, "9b6a6d9e687dc4"}) 19:15:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x600200, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1cb002) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="2e015839bf43a70376f22f66696c7530005b92dafd0a42b6ffa46d5685a0bd02456a61a2efbc97e8ef379208b2655307777d12fa889f6e72b674ecfe8f5f4f41baae1bf2065077839a52729941d4c5b0987b1f540a3191d4b919da590759bec5e2c2b7bfeebe12579c1f8f93aaca8e0bb9872671ea86"]) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000040)={0x8, 0x120, 0xfa00, {0x3, {0x3, 0xffff8001, "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", 0x54, 0x8, 0xfd, 0x55, 0x5c, 0x3f, 0x2, 0x1}}}, 0x128) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async, rerun: 64) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x140001, 0x0) (rerun: 64) write$snapshot(r5, &(0x7f00000001c0)="d0df00dd63bbaee707318473a03e040000ec03", 0x13) 19:15:15 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000014c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xd}}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000280)={{0x0, 0x6, 0x3, 0x8, 0x1000, 0xef, 0x7, 0x9, 0xe930, 0x0, 0x4c6, 0x2, 0xffffffffffffff83, 0xffffffff, 0x5}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$capi20(0xffffffffffffffff, &(0x7f0000001480)={0x10, 0x3, 0x83, 0x83, 0x1}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) read$FUSE(r1, &(0x7f0000001d40)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e21, 0x80000001, @empty, 0x8000}, r4}}, 0x38) r5 = openat$cgroup_ro(r1, &(0x7f0000001280)='io.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000012c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000001340)={0x6, 0x118, 0xfa00, {{0x0, 0x7, "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", 0x1f, 0x80, 0x0, 0x3d, 0x8, 0xb2, 0x4, 0x1}, r6}}, 0x120) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000001500)='FROZEN\x00', 0x7) 19:15:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0xfffffffffffffffe, 0x0, 0x0, 0x2}}, 0x20) fstat(r0, &(0x7f0000000040)) 19:15:15 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 19:15:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0x8fa500000, 0xe7, 0x9, 0xffffbfffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000044080)={0x723aff4e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "87f6de641320bc"}) (async, rerun: 64) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r7, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000045080)={0x5e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "b89d6dfb332eb8"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000046080)={0x400, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "0ff240062510c0"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000047080)={{0x0, 0x800, 0x2, 0x7, 0x0, 0x100000001, 0x7fff, 0xdfd1, 0x2, 0x3ff, 0x8, 0x3b449619, 0xbadf, 0x0, 0x9}}) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048080)={0x0, ""/256, 0x0, 0x0}) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048480)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048680)={0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048880)={0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048a80)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x91, "7440a7e2bf1da0"}) (async) r17 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x361a40, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049c80)={0xeb1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "76e9da9a74a155"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004ac80)={0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004ae80)={0x5fb46972, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "0a73df4e65ca45"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c080)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {0x0, r3}, {}, {}, {}, {}, {r5}, {r7}, {}, {0x0, r8}, {}, {0x0, r9}, {}, {}, {r10}, {0x0, r11}, {r12}, {}, {0x0, r13}, {}, {r14}, {r15}, {}, {0x0, r16}, {r18}, {}, {0x0, r19}, {}, {}, {}, {r20, r21}], 0x5, "a856271a4d5e4f"}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) (async) write$smackfs_logging(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x14) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (rerun: 64) 19:15:15 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="3078303030303030303030303030303030333a3078303030303030303030303030303030333a3078303030303030303030303030303030333a3078303030303055ec3036663936343662373a307830303030303030313030e930303030313a3078666666666666666666666666663638613a3078303030303030303030303030303862333a3078303030303030303030303030303030387c5f959bed3065cd126b2f3138343436373434303733373039353434323933202f7379732f66732f736d61636b66732f69707636686f737400008a848a453fc5fc00f4dcca0cccb5f09425c11011e1"], 0xc7) write$smackfs_ipv6host(r0, 0x0, 0xb9) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{0x0, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000474c0)={0x0, ""/256, 0x0, 0x0}) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000476c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000478c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000047ac0)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000047ac0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000047cc0)={0x3ff, [], 0x56, "283519237cae2c"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000047cc0)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x56, "283519237cae2c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000048cc0)={{0x0, 0x15d, 0x1, 0x1, 0xffff, 0x3, 0x5, 0x3, 0x10000, 0x0, 0x1, 0x4, 0x4, 0x6, 0x9}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000048cc0)={{0x0, 0x15d, 0x1, 0x1, 0xffff, 0x3, 0x5, 0x3, 0x10000, 0x0, 0x1, 0x4, 0x4, 0x6, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0xd02a, [], 0xff, "ba78f855d7d6f4"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049cc0)={0xd02a, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xff, "ba78f855d7d6f4"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004acc0)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004acc0)={0x0, ""/256, 0x0}) r14 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r15, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r15, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004aec0)={0x0, ""/256, 0x0, 0x0}) r17 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r19 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r19, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r20, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004b0c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b2c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r3}, {r5}, {0x0, r6}, {0x0, r7}, {r8}, {r9}, {r10, r11}, {r13}, {r15, r16}, {r18}, {r20, r21}], 0x9, "9b6a6d9e687dc4"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004b2c0)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2, r3}, {r5}, {0x0, r6}, {0x0, r7}, {r8}, {r9}, {r10, r11}, {r13}, {r15, r16}, {r18}, {r20, r21}], 0x9, "9b6a6d9e687dc4"}) 19:15:15 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000014c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xd}}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000280)={{0x0, 0x6, 0x3, 0x8, 0x1000, 0xef, 0x7, 0x9, 0xe930, 0x0, 0x4c6, 0x2, 0xffffffffffffff83, 0xffffffff, 0x5}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$capi20(0xffffffffffffffff, &(0x7f0000001480)={0x10, 0x3, 0x83, 0x83, 0x1}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) read$FUSE(r1, &(0x7f0000001d40)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e21, 0x80000001, @empty, 0x8000}, r4}}, 0x38) r5 = openat$cgroup_ro(r1, &(0x7f0000001280)='io.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000012c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000001340)={0x6, 0x118, 0xfa00, {{0x0, 0x7, "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", 0x1f, 0x80, 0x0, 0x3d, 0x8, 0xb2, 0x4, 0x1}, r6}}, 0x120) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000001500)='FROZEN\x00', 0x7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000014c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xd}}, 0x10) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000280)={{0x0, 0x6, 0x3, 0x8, 0x1000, 0xef, 0x7, 0x9, 0xe930, 0x0, 0x4c6, 0x2, 0xffffffffffffff83, 0xffffffff, 0x5}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$capi20(0xffffffffffffffff, &(0x7f0000001480)={0x10, 0x3, 0x83, 0x83, 0x1}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) (async) read$FUSE(r1, &(0x7f0000001d40)={0x2020}, 0x2020) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e21, 0x80000001, @empty, 0x8000}, r4}}, 0x38) (async) openat$cgroup_ro(r1, &(0x7f0000001280)='io.stat\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000012c0), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000001340)={0x6, 0x118, 0xfa00, {{0x0, 0x7, "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", 0x1f, 0x80, 0x0, 0x3d, 0x8, 0xb2, 0x4, 0x1}, r6}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) write$cgroup_freezer_state(r7, &(0x7f0000001500)='FROZEN\x00', 0x7) (async) 19:15:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0xfffffffffffffffe, 0x0, 0x0, 0x2}}, 0x20) fstat(r0, &(0x7f0000000040)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x13f, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0xfffffffffffffffe, 0x0, 0x0, 0x2}}, 0x20) (async) fstat(r0, &(0x7f0000000040)) (async) 19:15:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000280)={0xa0, 0xfffffffffffffff5, 0x0, {{0x0, 0x1, 0x8, 0xfffffffffffffffe, 0x8, 0x10000, {0x4, 0xe3, 0xffffffffffff81b7, 0xdf, 0x3ff, 0x3, 0x3, 0x7, 0x7, 0xa000, 0x7, r2, 0xffffffffffffffff, 0x40, 0x46da}}, {0x0, 0x4}}}, 0xa0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) 19:15:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x13f, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0xfffffffffffffffe, 0x0, 0x0, 0x2}}, 0x20) fstat(r0, &(0x7f0000000040)) 19:15:15 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x301042, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$smackfs_logging(r0, &(0x7f00000000c0), 0x14) 19:15:15 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000014c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xd}}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000280)={{0x0, 0x6, 0x3, 0x8, 0x1000, 0xef, 0x7, 0x9, 0xe930, 0x0, 0x4c6, 0x2, 0xffffffffffffff83, 0xffffffff, 0x5}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$capi20(0xffffffffffffffff, &(0x7f0000001480)={0x10, 0x3, 0x83, 0x83, 0x1}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "8eb7ebe19b16810e10150170bbab45c5466513a188e30b7ff781d322f3741225e8b8955bfea89f4d06606f49db16954d8991bf86e4bfb6b16fe0cf8b163ab7151b45c8a49c9e40d9ecf7aa7a20be6fd85d36ab081bcd823a7eb2da76d5ade8252d6995a39a05a6decbaf53f77cc4f4f8573f56586dc905dc9744becb6cd248433cc33cb01e3c561acf2f3766c0fb28ecd2553abed8b9411b2cea5117e99b32083e4f31d5f0708c034957d33e65bfd0eb61d068fa06d36b812a613bf9b9fbefb4d03e3a6c15a600527b1b1cb414b711df3f4fd6714d26dd06a48b5bccb63afea7e179bee23c20e532282614a8f6c15dffc882375b39b6023900f8bd5152629fee", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) read$FUSE(r1, &(0x7f0000001d40)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e21, 0x80000001, @empty, 0x8000}, r4}}, 0x38) r5 = openat$cgroup_ro(r1, &(0x7f0000001280)='io.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000012c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000001340)={0x6, 0x118, 0xfa00, {{0x0, 0x7, "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", 0x1f, 0x80, 0x0, 0x3d, 0x8, 0xb2, 0x4, 0x1}, r6}}, 0x120) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000001500)='FROZEN\x00', 0x7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000014c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xd}}, 0x10) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r3, 0xd0009411, &(0x7f0000000280)={{0x0, 0x6, 0x3, 0x8, 0x1000, 0xef, 0x7, 0x9, 0xe930, 0x0, 0x4c6, 0x2, 0xffffffffffffff83, 0xffffffff, 0x5}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$capi20(0xffffffffffffffff, &(0x7f0000001480)={0x10, 0x3, 0x83, 0x83, 0x1}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) (async) read$FUSE(r1, &(0x7f0000001d40)={0x2020}, 0x2020) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e21, 0x80000001, @empty, 0x8000}, r4}}, 0x38) (async) openat$cgroup_ro(r1, &(0x7f0000001280)='io.stat\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000012c0), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000001340)={0x6, 0x118, 0xfa00, {{0x0, 0x7, "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", 0x1f, 0x80, 0x0, 0x3d, 0x8, 0xb2, 0x4, 0x1}, r6}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, 0x0) (async) write$cgroup_freezer_state(r7, &(0x7f0000001500)='FROZEN\x00', 0x7) (async) 19:15:15 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/24, 0x18) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:15 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x301042, 0x0) (async) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$smackfs_logging(r0, &(0x7f00000000c0), 0x14) 19:15:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000280)={0xa0, 0xfffffffffffffff5, 0x0, {{0x0, 0x1, 0x8, 0xfffffffffffffffe, 0x8, 0x10000, {0x4, 0xe3, 0xffffffffffff81b7, 0xdf, 0x3ff, 0x3, 0x3, 0x7, 0x7, 0xa000, 0x7, r2, 0xffffffffffffffff, 0x40, 0x46da}}, {0x0, 0x4}}}, 0xa0) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) (rerun: 32) 19:15:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x201, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x600440, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x9, 0xc6d, "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", 0x2, 0x4, 0x20, 0xfa, 0x5, 0x81, 0x7, 0x1}}}, 0x120) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) write$FUSE_INIT(r4, &(0x7f00000002c0)={0x50, 0x0, 0x0, {0x7, 0x27, 0x4, 0x3000000, 0x2, 0x8, 0x6, 0x44}}, 0x50) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x18) 19:15:15 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000540)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r2, 0x8fa500000, 0xe7, 0x9, 0xffffbfffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000044080)={0x723aff4e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "87f6de641320bc"}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r5, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r7, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r7, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000045080)={0x5e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "b89d6dfb332eb8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000046080)={0x400, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x20, "0ff240062510c0"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000047080)={{0x0, 0x800, 0x2, 0x7, 0x0, 0x100000001, 0x7fff, 0xdfd1, 0x2, 0x3ff, 0x8, 0x3b449619, 0xbadf, 0x0, 0x9}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000047080)={{0x0, 0x800, 0x2, 0x7, 0x0, 0x100000001, 0x7fff, 0xdfd1, 0x2, 0x3ff, 0x8, 0x3b449619, 0xbadf, 0x0, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048480)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048680)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000048880)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000048a80)={0x40, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x91, "7440a7e2bf1da0"}) r17 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x361a40, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049c80)={0xeb1, [], 0x8, "76e9da9a74a155"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049c80)={0xeb1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "76e9da9a74a155"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004ac80)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004ac80)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004ae80)={0x5fb46972, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "0a73df4e65ca45"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c080)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {0x0, r3}, {}, {}, {}, {}, {r5}, {r7}, {}, {0x0, r8}, {}, {0x0, r9}, {}, {}, {r10}, {0x0, r11}, {r12}, {}, {0x0, r13}, {}, {r14}, {r15}, {}, {0x0, r16}, {r18}, {}, {0x0, r19}, {}, {}, {}, {r20, r21}], 0x5, "a856271a4d5e4f"}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, 0x0) write$smackfs_logging(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:15 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/24, 0x18) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000040)) (async) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/24, 0x18) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) 19:15:15 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x301042, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async, rerun: 32) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) write$smackfs_logging(r0, &(0x7f00000000c0), 0x14) 19:15:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000280)={0xa0, 0xfffffffffffffff5, 0x0, {{0x0, 0x1, 0x8, 0xfffffffffffffffe, 0x8, 0x10000, {0x4, 0xe3, 0xffffffffffff81b7, 0xdf, 0x3ff, 0x3, 0x3, 0x7, 0x7, 0xa000, 0x7, r2, 0xffffffffffffffff, 0x40, 0x46da}}, {0x0, 0x4}}}, 0xa0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) 19:15:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x201, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x600440, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x9, 0xc6d, "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", 0x2, 0x4, 0x20, 0xfa, 0x5, 0x81, 0x7, 0x1}}}, 0x120) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) write$FUSE_INIT(r4, &(0x7f00000002c0)={0x50, 0x0, 0x0, {0x7, 0x27, 0x4, 0x3000000, 0x2, 0x8, 0x6, 0x44}}, 0x50) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x18) 19:15:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:15 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000040)) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/24, 0x18) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x201, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x600440, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x9, 0xc6d, "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", 0x2, 0x4, 0x20, 0xfa, 0x5, 0x81, 0x7, 0x1}}}, 0x120) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) write$FUSE_INIT(r4, &(0x7f00000002c0)={0x50, 0x0, 0x0, {0x7, 0x27, 0x4, 0x3000000, 0x2, 0x8, 0x6, 0x44}}, 0x50) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x18) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x201, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x600440, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x9, 0xc6d, "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", 0x2, 0x4, 0x20, 0xfa, 0x5, 0x81, 0x7, 0x1}}}, 0x120) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, 0x0) (async) write$FUSE_INIT(r4, &(0x7f00000002c0)={0x50, 0x0, 0x0, {0x7, 0x27, 0x4, 0x3000000, 0x2, 0x8, 0x6, 0x44}}, 0x50) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x18) (async) 19:15:15 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 19:15:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x411200) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 19:15:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:15 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) (async) 19:15:15 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) name_to_handle_at(r0, &(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)=@ceph_nfs_confh={0x10}, &(0x7f0000000080), 0x0) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:15:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x411200) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x411200) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:15 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 19:15:15 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) name_to_handle_at(r0, &(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)=@ceph_nfs_confh={0x10}, &(0x7f0000000080), 0x0) (async) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:15:15 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x411200) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x411200) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) (async) 19:15:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$dsp(0xffffffffffffffff, &(0x7f0000000340)="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", 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:16 executing program 0: r0 = openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:16 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) name_to_handle_at(r0, &(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)=@ceph_nfs_confh={0x10}, &(0x7f0000000080), 0x0) (async) r1 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r1, 0x0, 0xb9) 19:15:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0xc}}, 0x10) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r3, 0x9}}, 0x10) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$dsp(0xffffffffffffffff, &(0x7f0000000340)="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", 0x1000) (async) write$dsp(0xffffffffffffffff, &(0x7f0000000340)="6d7088d00bc951cf6b8ef692b5574c78800a561bb07cdbdd4671fd9d2041d541d00e275bc611f8c3af5051fe293e53cddec53bdc993ba2f8605d74d87d7ae42f3d786db95837e15f8f21f6cfa5b221ce73923eef0329ce0e41180f3ceee9180d31aa5b5f5ad2c87db7131dde5157491d8d780b300dae76bdb15aca506b740409d11f05b681ad862b9153e6e51116cd31d91a0b2f7dbfa49164d49861bb3c44772331d7e5649015b7e7bdcbfe2cac17a4ead6d5ddf5e209973adad2754c1d93ad663062c2e1494f957032be6261cd9dd9b64c24d33b6a08e83f872060467fcc35973c41955fa81371302700af4966afe5f47fea30ecc574372f2723c7a25ad0d379a42806db9ac50df9a37c9491d7b6c1db30d6efe466121a41691a74d5c6115bf9845db9015104c67e3bb0c7c21808cd3068b0f1237c70c058b68174a8ca9d7ba617711ae085bb3f1d1aa1fbfcd357c7e9c3121507776bff6c38ebf8e3af8049ba304b094ffa6235c4b4206178280cb82277b416dee39471b3b42d9f3215553621a7843c27304cd505ef37a77c8e4bfd3a852f1b47710464c6f2a55aaf667cc722577f5e6c6e43d7a75bfa18aae8b259300a03cff2248f122cef2c61c6963afa0e50423c5bc73f89a007695a28c7ea1c2f5e0eaf619c100970a6c6740b04991b4b42a265d04918c866e0f0baa5b5369cbfc5ef9e3f5c8b1338000d7d413700147156620ea46d27a99709c14db5c03adb9736b4334dba4f7219180cd94fdcdf85bec3603638e1b60a8be01ce09fc685e8cb144de5aa41e9e26ab273e6e44774c7fe272111c524e4b3bd331c86dfcc486db9279aed62ceda9c788f29f6edf721c53871941ede5946d78d63caa15030270054104bfb862ad7a8a6c15240a34e6adcc749d27b28d7a743c104b356dd85e334fb5d841d77ca28ac3379c8b42160be8875a83f875329d19485bcc14b0dd134f05a614683873a7c84efb798e802c3f6e3038c695ea1baa2472549ce7eb810b4c87219804fead285f0e46b57d4cf2dd1bb3c35148f5ce7c8a25d568bd88bd83672365772202575db7d9dfe42abf7ea2c5acd97ab542f541472d104fe392958dbeaeb473457f0ae0562836a7f0d6b486ea00bf9f8957c9c50c0a5d77b6da6edb695d1e2969ba041c9f591ac40635f6bfb1c240da9ac8ebeb3190a6b61bd4c942c6846e8570ed63a5b14dbe1fabfe0b0a0c212e22e758727dbd33ff424bbcda4b9fcf50f617884f1738740a8d7a068618c2185b2ca4d4d8af156e456891459ab1b9a44783bf6f79897fffa43795b207b00894b6d7765a3320945c6d575c4887928a74c88be46febf283ecd71b5a5fb8d1bef20a56b957de9704139101911110e7b185bb8a34741362c56fb52e900940d46d66ff756a88036a78be01b12d4631a2a0b416b515c01614b8e9402b13a3e079f58cab6b5de8f694c83d89717ed94a9435d64d0669d79be664062fe65c5d06453ea3b2d83901f3038a669ecc4a7d555649efe1aa859328da6c0666c4c8672400802d8744867e5b90a2fd68267e6189507bbe214abe9091ad1ec1a17e8a3f44da99ebfa8f6fc7cfde3f31d9c2eaf801a8b37f9c7167c30d79af5ec4ccd7397ac2977c056459a593bfcff685c887766ed4a5735d297748f376d5b08573d6e5bcd721ac16689001bdc4b553217c9592869e9bab1e65ada337ece82d5f0cc62bca93e6019e0a69c9f4596b6a1971305d5238e6fff6ba1f1c0549216038b50bc5f7cea43622e33cb1ee87aee5aaea8c68677424233f414cd72a8e3db04a8d0343521a39fb480f2a486d3f6d14a564ebe0b73f7faba10393d190ced3c3b718019b08a8d47eacd2f08581b058b8a307c1ed5852cc504bb7d6d62a5211c11c1c194d4a610a1d313a90541fa2f0317f144d85ea8b23f594a956ddcc136a72e192d5fd045efd5528d68da3d1d8da3f0195112fccf3794e5f400e7aa8160665d9daa99f8eebb9730f15d931880973fcd67ba74614e42fb5956f2e6db23308eaca8bfe7e262096f64df7f2533425077c76a1489028835b90219755f3b76f026362cd7aa0ac82bfb9ddf5be2010f520e76f9ab990775a5346f7b592b8e13ccd65e79387b6662451321c9b9ee7cb2ab766d8ca0aa677b162fbb9d242b63b6e77431d40ac94287018eafab59b8007ceeaab0796d58ae5ec9ef2872c6f163ae11c34300fb4a4b266217a025a5b626894d274c548292272ca2e9ff8d15703e857101dd7331112b1c5b9cbd5a64fda409300138249624aefeb2520c2470ab678d88c406c82c82dffe017cf50f2924d629450f3f4506c10813a353a6b92ae298a45defa156de22774fba73c268841f18e327c95322447fef5d8cbab1d94b8f20bf41fdab1aed2cb469501b70a2bed89fe5530710148ed87cea1eec830fc8883f042e6a8faf0e08d7ab26f561f916f15d1e6a0ec265dc57c596ff25c3b35c8bb99c043e5b446d434631ed658bb515b3668a133533e6f09f68b1b97be5b83e4825e90eb4cdaafafc78d995d896449e3f07af0c1a8cfb2e32322b42b3740a858c36cffec49a7cdc2902edbee2d0cf0f6636f965b25b5605d16dda9661834117660bb8a050b39d11e10e126f051733583358b873ccaf863ab7896e5e8f90d128d6a687e534a90859cb45529e66d2ffc8f67e5e5ed31a558738f5d7f8bb8d2e4c4331c4658080c05eb74c965b8d21d5c183fd9e2fe7201e74b4a7a415bf2e3fd6e6c439ff388b14b6192600fe5fcd5bdf8d8a4fc259eff0f24bd567a9a966060f9a99d68c81203d735f1d6cc07079ecea06a5cca81f83e0c20ad80f400ce962e1c072bd85c8ab6dffd545802d30162046740c50dbd2a515b9ce91892d47bc7d9cf0d69718bfdef3cdd20172201e5b65de718a7661d51ee234fc84ad9297f20ba3d9b6f8d5434763a538fa5e27df93cfec879c88de75be4616e39fa8222e5e29fb9d7903d0c32b94d26c33b3edb72b3c309418b62f0ddc5348785c25422aa23b5ebcea402da5a1b94f7c3f8afc0e3aea8a2953943196ae176108290f42c7d899f02ba48f22a2d3169fd35f58ef98e132e573cd7eecb2d5025286e4ef7f5a1a364600086f9f0d5b512fa0d00240d219923c7bf0f43a375d21386518d8520b843e07461a1313c9211b72d249d6e49eb9902be6c3dee5ccc627ff7c73c0c06629a4ce83aa02bc497562033a59938202746d81f9a49a87d9eaf0ecee32d13adf0a62b066344e4e87ec93426d38e2a59ee97a563bd5299f28d46ccb4abd1f5ea42e23ed1e76b9e1f0852ceb0ba8aaa3f49108fc00f8200798a923ba6bcefa83ea92ef5ba523a1c739ba2b8a5d148c0eade473dc62288d3803aa1c333a1ded2ed3706a84567e266bfdb8d74fc052f2fed86f407b666bf65ab9a0cfec81a7813e7018c077c0f85159cc128a4064f5e8f21297e7ff272509427ef9d9e80dadf5b972daf899f12c6ecf9f50e6e4619853f4968d736a9fb87b3c4f949509b80e2f92d1a44269e302d529e440b6ec7eb8b63f240a4c3485a479e72e1ea95468a9429171cd06d35cab295f658c24df4b12ce4de13ceb27cc21daeadc68ea16aade6f52b0414b534632a3d312eda10913ef3031083be9f03bb6f6a73d77dfdf17d5e18b0ba4f815f01262aabf6647cce9b77d90d890182a92ea1ed865d14837c41ae8b68c5672c96fbe7ee8b305a8f800ebfc2b9a0bd96467f6ff736d4e73fa1ce642d3cb2b8064b2fa414d16f778ef35ad3e0b89384fdc0fcddffc89dfecd4d46ee58af0e3121a325f413aa21c4607e6e0ce60d14004471349d6c71712296edf0c1716503c9285792af5cd6e12cb451cc09bade5af0a8cb1a85b7babf3985f4187da7e96d2ec3054dfe621dd09e41149430b3dccbb2e6bbc78346bd7fba2be168dfa7e17befb78d915c71bba45be7cb3c098db72a4b37aa1db97dc3468dfaac33a9228681882ec2f3cc1e8452e978ae7ad1f426c437ec6433b6ddb3033260722ec413bb54742300a4ecac0c959eab128edb980459bd0dfd9cff72f70e765c33faa77e4ba7c5f9bd595a7684ec7d48291579cea2bf9d86b6d094557d3a3f2972bd126db35fcbc4098b64486600090e133fe8be0bc4581bc39dc996a2183c2c3ac540be23aad256d53c8aed081b6caf87c7e11da1bf9e013135266dae3c5d7b1d5e163b9f3c19baa6bb4111081439c86836c1ac5fbc318f5ae0663f9788a45066209ef6e1d5034610ad8135834834358b13385b3edd74e539c4b3a9fc2adf566b9ca827b568c32ef630ed1007e623c07b4ff800c15ffbd229ee3574514942dcb29a97a0ab56b3da4a60faa372d1b4c4143172e29b6dc8221a4ab79107cda385099163ff1e6aeac61c91964511ce720a4bfd82b6645027bc7d58336f8de72ad535a6b7f2b4e4c6f2c8a022e5dbb95c6b1d60df75920a6a42bbdaf7f83d038de7f6100aa4d2c774d1e9e11dc574475ad05865b032f161fecf7f68f5d82fd3fdfa8b6158a9784b55b72ce9c8658d0684fac7a2ae5e37252d8b85871a113a1c9ee8e1265359d308dc34fd1913b1adf8cbed79dd10cfdc5cc2503a06a277e5ef43db86dc53fe5f07b27cbefef5379f0f0797ab3a11579a76d2c432eead49d38205717c697bd769700f280b2dd85dcbc08b4db46882b53bc5ad446393ad5e813a8d01c13cc16d049a784374d93b1c657dfd9498cc45660bac0f7ef4c028b562ac57a8dc81e95c5fba30cd6018bcd571960ec8194a4540cac151969d9fd843c4dbfa53732b9574324417a55dc9c9ff13d9cee6114f246f2d001c6110722df63c59b4089eb68366071a292d4687e98c4b268c2c52d80421690aa3d915a0bec0c8b6a7cd0f2c896b876584ff746c04f27dce8f108957095cf3354943441c5cbf73f362b8f56f20e9f60d1eead4dffdaefdb764b7fe6af50609609f9305917e80ebed223e9a9c3ad42f9810cbdb9e5f1887fefd671b7f9a5fb2b723761a8885975fdb3b326cfbe834f26cdda7f0cddba55540319d496d771d870771305d219b769a294ba8abda9411e1557053ffa4a4a572cb02e53882e911194629c323eb08c29519ce53c537c3374b0ee2202c8605bbfd96e1e2cc14ed1839c49f6a8223b2b8f040ec6a54c1620ab98df047d77aafe039e8ac65a36b2c66c43e163183834e1b3856b68180a8efdfc5d0ea66d21b1590c7e11dc84a01a91ed3cf4c33780e18f149feab95cdc6c7229c43d0c07aabe5d09f3ac0f3ca81d2edcbaf220247b7cb92d998a3b4b73159ce41ba3811f377022878d06e7019d4e4c2e4605fdab5dcd82ab27b9f5ad8090fc7cd7e4289742356e2c846cd8aa45adf3c462e679034c1667eec85e978c8641912ab187e505fe2ee12add4c5f2e50b4a2f5a2ff8532f1adf05c1f42922b39cb75a26633c7e5960d3397f5616c575ccaa606eb3a5ba5a922c9a94b69699c18c814828cbc2d8c2292297d19ca1798dd68f5dae1dc3150ed9cfd94e03085e5c37ec568838ec9a886a818e898b9ea0c2d776adc056d253eb74d9311ab6ea7d9264c831014c719b0ace9fb39935eb5f5dd60efb7bd55fef26fac0784d1f89fa5a236df8d9049cbc4c24d38a9758c6c4d0031781e3edea6e5052ffaabc899e341f6ff61521d3547fdc01a6df7ca88eb4f3eba076ce5e1b4894216d3e823ce8fd36ad3aebed0d8da652af5923513ea7f232ec3a68c27157582a22f42fa97013cca73db656a1cb1debfc49b3d43d7b9672dfd1c10c47f46bb26cbca26216109dcb5215f5403c791acd331cc9dcbd26bc178db892c0cab", 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) 19:15:16 executing program 0: r0 = openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) 19:15:16 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) getdents(r0, &(0x7f0000000080)=""/53, 0x35) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) write$smackfs_label(r0, &(0x7f00000000c0), 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) 19:15:16 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0, @ANYBLOB="0000000000006c2b439739cb2b11db37", @ANYRESDEC=r2, @ANYRESOCT=r0, @ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRES64=r3, @ANYRESOCT=r2]) r4 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r4, 0x0, 0xb9) 19:15:16 executing program 0: r0 = openat$smackfs_ptrace(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:16 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) getdents(r0, &(0x7f0000000080)=""/53, 0x35) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) write$smackfs_label(r0, &(0x7f00000000c0), 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) (async) getdents(r0, &(0x7f0000000080)=""/53, 0x35) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) (async) write$smackfs_label(r0, &(0x7f00000000c0), 0x1) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) (async) 19:15:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async, rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0xc}}, 0x10) (async, rerun: 64) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r3, 0x9}}, 0x10) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$dsp(0xffffffffffffffff, &(0x7f0000000340)="6d7088d00bc951cf6b8ef692b5574c78800a561bb07cdbdd4671fd9d2041d541d00e275bc611f8c3af5051fe293e53cddec53bdc993ba2f8605d74d87d7ae42f3d786db95837e15f8f21f6cfa5b221ce73923eef0329ce0e41180f3ceee9180d31aa5b5f5ad2c87db7131dde5157491d8d780b300dae76bdb15aca506b740409d11f05b681ad862b9153e6e51116cd31d91a0b2f7dbfa49164d49861bb3c44772331d7e5649015b7e7bdcbfe2cac17a4ead6d5ddf5e209973adad2754c1d93ad663062c2e1494f957032be6261cd9dd9b64c24d33b6a08e83f872060467fcc35973c41955fa81371302700af4966afe5f47fea30ecc574372f2723c7a25ad0d379a42806db9ac50df9a37c9491d7b6c1db30d6efe466121a41691a74d5c6115bf9845db9015104c67e3bb0c7c21808cd3068b0f1237c70c058b68174a8ca9d7ba617711ae085bb3f1d1aa1fbfcd357c7e9c3121507776bff6c38ebf8e3af8049ba304b094ffa6235c4b4206178280cb82277b416dee39471b3b42d9f3215553621a7843c27304cd505ef37a77c8e4bfd3a852f1b47710464c6f2a55aaf667cc722577f5e6c6e43d7a75bfa18aae8b259300a03cff2248f122cef2c61c6963afa0e50423c5bc73f89a007695a28c7ea1c2f5e0eaf619c100970a6c6740b04991b4b42a265d04918c866e0f0baa5b5369cbfc5ef9e3f5c8b1338000d7d413700147156620ea46d27a99709c14db5c03adb9736b4334dba4f7219180cd94fdcdf85bec3603638e1b60a8be01ce09fc685e8cb144de5aa41e9e26ab273e6e44774c7fe272111c524e4b3bd331c86dfcc486db9279aed62ceda9c788f29f6edf721c53871941ede5946d78d63caa15030270054104bfb862ad7a8a6c15240a34e6adcc749d27b28d7a743c104b356dd85e334fb5d841d77ca28ac3379c8b42160be8875a83f875329d19485bcc14b0dd134f05a614683873a7c84efb798e802c3f6e3038c695ea1baa2472549ce7eb810b4c87219804fead285f0e46b57d4cf2dd1bb3c35148f5ce7c8a25d568bd88bd83672365772202575db7d9dfe42abf7ea2c5acd97ab542f541472d104fe392958dbeaeb473457f0ae0562836a7f0d6b486ea00bf9f8957c9c50c0a5d77b6da6edb695d1e2969ba041c9f591ac40635f6bfb1c240da9ac8ebeb3190a6b61bd4c942c6846e8570ed63a5b14dbe1fabfe0b0a0c212e22e758727dbd33ff424bbcda4b9fcf50f617884f1738740a8d7a068618c2185b2ca4d4d8af156e456891459ab1b9a44783bf6f79897fffa43795b207b00894b6d7765a3320945c6d575c4887928a74c88be46febf283ecd71b5a5fb8d1bef20a56b957de9704139101911110e7b185bb8a34741362c56fb52e900940d46d66ff756a88036a78be01b12d4631a2a0b416b515c01614b8e9402b13a3e079f58cab6b5de8f694c83d89717ed94a9435d64d0669d79be664062fe65c5d06453ea3b2d83901f3038a669ecc4a7d555649efe1aa859328da6c0666c4c8672400802d8744867e5b90a2fd68267e6189507bbe214abe9091ad1ec1a17e8a3f44da99ebfa8f6fc7cfde3f31d9c2eaf801a8b37f9c7167c30d79af5ec4ccd7397ac2977c056459a593bfcff685c887766ed4a5735d297748f376d5b08573d6e5bcd721ac16689001bdc4b553217c9592869e9bab1e65ada337ece82d5f0cc62bca93e6019e0a69c9f4596b6a1971305d5238e6fff6ba1f1c0549216038b50bc5f7cea43622e33cb1ee87aee5aaea8c68677424233f414cd72a8e3db04a8d0343521a39fb480f2a486d3f6d14a564ebe0b73f7faba10393d190ced3c3b718019b08a8d47eacd2f08581b058b8a307c1ed5852cc504bb7d6d62a5211c11c1c194d4a610a1d313a90541fa2f0317f144d85ea8b23f594a956ddcc136a72e192d5fd045efd5528d68da3d1d8da3f0195112fccf3794e5f400e7aa8160665d9daa99f8eebb9730f15d931880973fcd67ba74614e42fb5956f2e6db23308eaca8bfe7e262096f64df7f2533425077c76a1489028835b90219755f3b76f026362cd7aa0ac82bfb9ddf5be2010f520e76f9ab990775a5346f7b592b8e13ccd65e79387b6662451321c9b9ee7cb2ab766d8ca0aa677b162fbb9d242b63b6e77431d40ac94287018eafab59b8007ceeaab0796d58ae5ec9ef2872c6f163ae11c34300fb4a4b266217a025a5b626894d274c548292272ca2e9ff8d15703e857101dd7331112b1c5b9cbd5a64fda409300138249624aefeb2520c2470ab678d88c406c82c82dffe017cf50f2924d629450f3f4506c10813a353a6b92ae298a45defa156de22774fba73c268841f18e327c95322447fef5d8cbab1d94b8f20bf41fdab1aed2cb469501b70a2bed89fe5530710148ed87cea1eec830fc8883f042e6a8faf0e08d7ab26f561f916f15d1e6a0ec265dc57c596ff25c3b35c8bb99c043e5b446d434631ed658bb515b3668a133533e6f09f68b1b97be5b83e4825e90eb4cdaafafc78d995d896449e3f07af0c1a8cfb2e32322b42b3740a858c36cffec49a7cdc2902edbee2d0cf0f6636f965b25b5605d16dda9661834117660bb8a050b39d11e10e126f051733583358b873ccaf863ab7896e5e8f90d128d6a687e534a90859cb45529e66d2ffc8f67e5e5ed31a558738f5d7f8bb8d2e4c4331c4658080c05eb74c965b8d21d5c183fd9e2fe7201e74b4a7a415bf2e3fd6e6c439ff388b14b6192600fe5fcd5bdf8d8a4fc259eff0f24bd567a9a966060f9a99d68c81203d735f1d6cc07079ecea06a5cca81f83e0c20ad80f400ce962e1c072bd85c8ab6dffd545802d30162046740c50dbd2a515b9ce91892d47bc7d9cf0d69718bfdef3cdd20172201e5b65de718a7661d51ee234fc84ad9297f20ba3d9b6f8d5434763a538fa5e27df93cfec879c88de75be4616e39fa8222e5e29fb9d7903d0c32b94d26c33b3edb72b3c309418b62f0ddc5348785c25422aa23b5ebcea402da5a1b94f7c3f8afc0e3aea8a2953943196ae176108290f42c7d899f02ba48f22a2d3169fd35f58ef98e132e573cd7eecb2d5025286e4ef7f5a1a364600086f9f0d5b512fa0d00240d219923c7bf0f43a375d21386518d8520b843e07461a1313c9211b72d249d6e49eb9902be6c3dee5ccc627ff7c73c0c06629a4ce83aa02bc497562033a59938202746d81f9a49a87d9eaf0ecee32d13adf0a62b066344e4e87ec93426d38e2a59ee97a563bd5299f28d46ccb4abd1f5ea42e23ed1e76b9e1f0852ceb0ba8aaa3f49108fc00f8200798a923ba6bcefa83ea92ef5ba523a1c739ba2b8a5d148c0eade473dc62288d3803aa1c333a1ded2ed3706a84567e266bfdb8d74fc052f2fed86f407b666bf65ab9a0cfec81a7813e7018c077c0f85159cc128a4064f5e8f21297e7ff272509427ef9d9e80dadf5b972daf899f12c6ecf9f50e6e4619853f4968d736a9fb87b3c4f949509b80e2f92d1a44269e302d529e440b6ec7eb8b63f240a4c3485a479e72e1ea95468a9429171cd06d35cab295f658c24df4b12ce4de13ceb27cc21daeadc68ea16aade6f52b0414b534632a3d312eda10913ef3031083be9f03bb6f6a73d77dfdf17d5e18b0ba4f815f01262aabf6647cce9b77d90d890182a92ea1ed865d14837c41ae8b68c5672c96fbe7ee8b305a8f800ebfc2b9a0bd96467f6ff736d4e73fa1ce642d3cb2b8064b2fa414d16f778ef35ad3e0b89384fdc0fcddffc89dfecd4d46ee58af0e3121a325f413aa21c4607e6e0ce60d14004471349d6c71712296edf0c1716503c9285792af5cd6e12cb451cc09bade5af0a8cb1a85b7babf3985f4187da7e96d2ec3054dfe621dd09e41149430b3dccbb2e6bbc78346bd7fba2be168dfa7e17befb78d915c71bba45be7cb3c098db72a4b37aa1db97dc3468dfaac33a9228681882ec2f3cc1e8452e978ae7ad1f426c437ec6433b6ddb3033260722ec413bb54742300a4ecac0c959eab128edb980459bd0dfd9cff72f70e765c33faa77e4ba7c5f9bd595a7684ec7d48291579cea2bf9d86b6d094557d3a3f2972bd126db35fcbc4098b64486600090e133fe8be0bc4581bc39dc996a2183c2c3ac540be23aad256d53c8aed081b6caf87c7e11da1bf9e013135266dae3c5d7b1d5e163b9f3c19baa6bb4111081439c86836c1ac5fbc318f5ae0663f9788a45066209ef6e1d5034610ad8135834834358b13385b3edd74e539c4b3a9fc2adf566b9ca827b568c32ef630ed1007e623c07b4ff800c15ffbd229ee3574514942dcb29a97a0ab56b3da4a60faa372d1b4c4143172e29b6dc8221a4ab79107cda385099163ff1e6aeac61c91964511ce720a4bfd82b6645027bc7d58336f8de72ad535a6b7f2b4e4c6f2c8a022e5dbb95c6b1d60df75920a6a42bbdaf7f83d038de7f6100aa4d2c774d1e9e11dc574475ad05865b032f161fecf7f68f5d82fd3fdfa8b6158a9784b55b72ce9c8658d0684fac7a2ae5e37252d8b85871a113a1c9ee8e1265359d308dc34fd1913b1adf8cbed79dd10cfdc5cc2503a06a277e5ef43db86dc53fe5f07b27cbefef5379f0f0797ab3a11579a76d2c432eead49d38205717c697bd769700f280b2dd85dcbc08b4db46882b53bc5ad446393ad5e813a8d01c13cc16d049a784374d93b1c657dfd9498cc45660bac0f7ef4c028b562ac57a8dc81e95c5fba30cd6018bcd571960ec8194a4540cac151969d9fd843c4dbfa53732b9574324417a55dc9c9ff13d9cee6114f246f2d001c6110722df63c59b4089eb68366071a292d4687e98c4b268c2c52d80421690aa3d915a0bec0c8b6a7cd0f2c896b876584ff746c04f27dce8f108957095cf3354943441c5cbf73f362b8f56f20e9f60d1eead4dffdaefdb764b7fe6af50609609f9305917e80ebed223e9a9c3ad42f9810cbdb9e5f1887fefd671b7f9a5fb2b723761a8885975fdb3b326cfbe834f26cdda7f0cddba55540319d496d771d870771305d219b769a294ba8abda9411e1557053ffa4a4a572cb02e53882e911194629c323eb08c29519ce53c537c3374b0ee2202c8605bbfd96e1e2cc14ed1839c49f6a8223b2b8f040ec6a54c1620ab98df047d77aafe039e8ac65a36b2c66c43e163183834e1b3856b68180a8efdfc5d0ea66d21b1590c7e11dc84a01a91ed3cf4c33780e18f149feab95cdc6c7229c43d0c07aabe5d09f3ac0f3ca81d2edcbaf220247b7cb92d998a3b4b73159ce41ba3811f377022878d06e7019d4e4c2e4605fdab5dcd82ab27b9f5ad8090fc7cd7e4289742356e2c846cd8aa45adf3c462e679034c1667eec85e978c8641912ab187e505fe2ee12add4c5f2e50b4a2f5a2ff8532f1adf05c1f42922b39cb75a26633c7e5960d3397f5616c575ccaa606eb3a5ba5a922c9a94b69699c18c814828cbc2d8c2292297d19ca1798dd68f5dae1dc3150ed9cfd94e03085e5c37ec568838ec9a886a818e898b9ea0c2d776adc056d253eb74d9311ab6ea7d9264c831014c719b0ace9fb39935eb5f5dd60efb7bd55fef26fac0784d1f89fa5a236df8d9049cbc4c24d38a9758c6c4d0031781e3edea6e5052ffaabc899e341f6ff61521d3547fdc01a6df7ca88eb4f3eba076ce5e1b4894216d3e823ce8fd36ad3aebed0d8da652af5923513ea7f232ec3a68c27157582a22f42fa97013cca73db656a1cb1debfc49b3d43d7b9672dfd1c10c47f46bb26cbca26216109dcb5215f5403c791acd331cc9dcbd26bc178db892c0cab", 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$dsp(0xffffffffffffffff, &(0x7f0000000340)="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", 0x1000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) 19:15:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0xc}}, 0x10) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r3, 0x9}}, 0x10) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0xc}}, 0x10) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r3, 0x9}}, 0x10) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) 19:15:16 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0, @ANYBLOB="0000000000006c2b439739cb2b11db37", @ANYRESDEC=r2, @ANYRESOCT=r0, @ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRES64=r3, @ANYRESOCT=r2]) (async) r4 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r4, 0x0, 0xb9) 19:15:16 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x4, &(0x7f0000000280)) pselect6(0x40, &(0x7f0000000000)={0x90ee, 0x7, 0x8, 0x1, 0x800, 0x0, 0x8, 0x4b}, &(0x7f00000000c0)={0xffffffffffffffe1, 0x5, 0x9, 0x401, 0x8, 0x1ff, 0x7, 0x800}, &(0x7f0000000140)={0x50, 0x3, 0x1000, 0x800, 0x9, 0x0, 0x1, 0xfffffffffffffff9}, &(0x7f00000001c0)={r0, r1+60000000}, &(0x7f0000000240)={&(0x7f0000000200), 0x8}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {r4, 0xee01}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e21, 0x0, @private2}, r2}}, 0x38) 19:15:16 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) getdents(r0, &(0x7f0000000080)=""/53, 0x35) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) write$smackfs_label(r0, &(0x7f00000000c0), 0x1) (async, rerun: 32) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async, rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {r4, 0xee01}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e21, 0x0, @private2}, r2}}, 0x38) 19:15:16 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1, @ANYRES32=r0, @ANYBLOB="0000000000006c2b439739cb2b11db37", @ANYRESDEC=r2, @ANYRESOCT=r0, @ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRES64=r3, @ANYRESOCT=r2]) (async) r4 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_ipv6host(r4, 0x0, 0xb9) 19:15:16 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x4, &(0x7f0000000280)) (async) pselect6(0x40, &(0x7f0000000000)={0x90ee, 0x7, 0x8, 0x1, 0x800, 0x0, 0x8, 0x4b}, &(0x7f00000000c0)={0xffffffffffffffe1, 0x5, 0x9, 0x401, 0x8, 0x1ff, 0x7, 0x800}, &(0x7f0000000140)={0x50, 0x3, 0x1000, 0x800, 0x9, 0x0, 0x1, 0xfffffffffffffff9}, &(0x7f00000001c0)={r0, r1+60000000}, &(0x7f0000000240)={&(0x7f0000000200), 0x8}) (async, rerun: 32) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (rerun: 32) 19:15:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x0, 0xffffffffffffffff, 0x1a76c8a64cbfe137, 0x0, @ib={0x1b, 0x8001, 0x7fff, {"cd8900ae4a147db2323fbfb81a2d662d"}, 0x0, 0x6, 0x4}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) 19:15:16 executing program 1: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x84440) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x84100, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0xd2, 0xfffffffe}}, 0x30) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x202, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180), 0x0, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {r4, 0xee01}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e21, 0x0, @private2}, r2}}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x4, {0xa, 0x4e21, 0x0, @private2}, r2}}, 0x38) 19:15:16 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0x2) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:16 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x4, &(0x7f0000000280)) (async) pselect6(0x40, &(0x7f0000000000)={0x90ee, 0x7, 0x8, 0x1, 0x800, 0x0, 0x8, 0x4b}, &(0x7f00000000c0)={0xffffffffffffffe1, 0x5, 0x9, 0x401, 0x8, 0x1ff, 0x7, 0x800}, &(0x7f0000000140)={0x50, 0x3, 0x1000, 0x800, 0x9, 0x0, 0x1, 0xfffffffffffffff9}, &(0x7f00000001c0)={r0, r1+60000000}, &(0x7f0000000240)={&(0x7f0000000200), 0x8}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) 19:15:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x0, 0xffffffffffffffff, 0x1a76c8a64cbfe137, 0x0, @ib={0x1b, 0x8001, 0x7fff, {"cd8900ae4a147db2323fbfb81a2d662d"}, 0x0, 0x6, 0x4}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) 19:15:16 executing program 1: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x84440) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x84100, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0xd2, 0xfffffffe}}, 0x30) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x202, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x84440) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x84100, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0xd2, 0xfffffffe}}, 0x30) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x202, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) (async) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r1, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x577, @private0}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x38) 19:15:16 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0x2) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x0, 0xffffffffffffffff, 0x1a76c8a64cbfe137, 0x0, @ib={0x1b, 0x8001, 0x7fff, {"cd8900ae4a147db2323fbfb81a2d662d"}, 0x0, 0x6, 0x4}}}, 0xa0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x0, 0xffffffffffffffff, 0x1a76c8a64cbfe137, 0x0, @ib={0x1b, 0x8001, 0x7fff, {"cd8900ae4a147db2323fbfb81a2d662d"}, 0x0, 0x6, 0x4}}}, 0xa0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) (async) openat$cgroup_subtree(r2, &(0x7f0000000080), 0x2, 0x0) (async) 19:15:16 executing program 0: pselect6(0x40, &(0x7f0000000040)={0xfffffffffffffffc}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:16 executing program 1: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x84440) (async) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x84440) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x84100, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x4, 0xd2, 0xfffffffe}}, 0x30) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x202, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) 19:15:16 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0x2) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r1, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x577, @private0}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r1, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x577, @private0}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x106, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x38) 19:15:16 executing program 0: pselect6(0x40, &(0x7f0000000040)={0xfffffffffffffffc}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:16 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e20, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x9}, r0}}, 0x38) 19:15:16 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4a2100, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000080)='FREEZING\x00', 0x9) 19:15:16 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x0) 19:15:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, r1, 0x1c, 0x1, @in6={0xa, 0x4e20, 0x577, @private0}}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x106, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x38) 19:15:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e20, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x9}, r0}}, 0x38) 19:15:17 executing program 0: pselect6(0x40, &(0x7f0000000040)={0xfffffffffffffffc}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 19:15:17 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4a2100, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$cgroup_freezer_state(r1, &(0x7f0000000080)='FREEZING\x00', 0x9) 19:15:17 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x0) 19:15:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x180, "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", 0x9, 0x1f, 0x3, 0x3, 0x1, 0x7, 0x72}, r2}}, 0x128) 19:15:17 executing program 0: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:17 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4a2100, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000080)='FREEZING\x00', 0x9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x4a2100, 0x0) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$cgroup_freezer_state(r1, &(0x7f0000000080)='FREEZING\x00', 0x9) (async) 19:15:17 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e20, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x9}, r0}}, 0x38) 19:15:17 executing program 0: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (async) 19:15:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x180, "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", 0x9, 0x1f, 0x3, 0x3, 0x1, 0x7, 0x72}, r2}}, 0x128) 19:15:17 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x0) 19:15:17 executing program 4: write$smackfs_labels_list(0xffffffffffffffff, &(0x7f0000000000)={[{'$'}]}, 0x3) write$smackfs_ipv6host(0xffffffffffffffff, 0x0, 0xb9) 19:15:17 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040), 0x301100, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) 19:15:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x180, "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", 0x9, 0x1f, 0x3, 0x3, 0x1, 0x7, 0x72}, r2}}, 0x128) 19:15:17 executing program 0: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async, rerun: 64) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) (rerun: 64) 19:15:17 executing program 4: write$smackfs_labels_list(0xffffffffffffffff, &(0x7f0000000000)={[{'$'}]}, 0x3) write$smackfs_ipv6host(0xffffffffffffffff, 0x0, 0xb9) (async) write$smackfs_ipv6host(0xffffffffffffffff, 0x0, 0xb9) 19:15:17 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:17 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r4, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000100)={{r4, 0x7fffffff, 0x1, 0x8, 0x7fff, 0x7fff, 0xfff, 0x9, 0x1, 0x0, 0x81, 0x400, 0x6, 0x3, 0x1}}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000000)={'vlan1', 0x32, 0x30}, 0x8) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2c0000ffff09000264f557282e402e4d936c91515b75ae000000000000000000000500000000000000040000d3880e46da30a85ea8e5620fc322acce34b88736027daf2be410925e32ddfb9a4c13f0af5244eda6af86766e15d9f26374e797492adf6136e0e9026686db6daf60219e492070b919f4ff0a41f40eb1"], 0x2c) 19:15:17 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040), 0x301100, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) 19:15:17 executing program 4: write$smackfs_labels_list(0xffffffffffffffff, &(0x7f0000000000)={[{'$'}]}, 0x3) write$smackfs_ipv6host(0xffffffffffffffff, 0x0, 0xb9) write$smackfs_labels_list(0xffffffffffffffff, &(0x7f0000000000)={[{'$'}]}, 0x3) (async) write$smackfs_ipv6host(0xffffffffffffffff, 0x0, 0xb9) (async) 19:15:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x1ff, "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", 0x1f, 0x3, 0x80, 0x0, 0x6, 0x7, 0x2, 0x1}, r4}}, 0x120) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r6, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r5, &(0x7f0000002100)={0x50, 0x0, r7}, 0x50) write$FUSE_BMAP(r2, &(0x7f00000000c0)={0x18, 0x0, r7, {0x10000}}, 0x18) 19:15:17 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:17 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040), 0x301100, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x9}}, 0x20) 19:15:17 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r4, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async, rerun: 64) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000100)={{r4, 0x7fffffff, 0x1, 0x8, 0x7fff, 0x7fff, 0xfff, 0x9, 0x1, 0x0, 0x81, 0x400, 0x6, 0x3, 0x1}}) (async, rerun: 64) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) (async) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000000)={'vlan1', 0x32, 0x30}, 0x8) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2c0000ffff09000264f557282e402e4d936c91515b75ae000000000000000000000500000000000000040000d3880e46da30a85ea8e5620fc322acce34b88736027daf2be410925e32ddfb9a4c13f0af5244eda6af86766e15d9f26374e797492adf6136e0e9026686db6daf60219e492070b919f4ff0a41f40eb1"], 0x2c) 19:15:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) (async) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x1ff, "c4680f9ced518792de1003264e80426ff211b01bffc31bb8aa0f83cb7cc3bfe518700862b79e89dedfa7b95c13eaf0b3b4d30a209154261d60e0b25d74756915c0e67428e1cce3334c01ed82803319ce05415b565bff7c1d0798803e11c3215d047d29560f174243683d3e7d886ab7193ae19d94495d68bfb7144ea86350ef86e22d17aa9837553310ff3fe96656851c4e192266b1bfe67fa404638e0c959981301b2263ed758c4dd8f38f35b472c7d38d184bb9ccf92831e76eb9bb501a9ea1e1042b0630e150dabe76ff55c800b03f1a2d2ff02dd7f5fd8157fc953cf6996334738457df5d09ba3d7b0f028af4ef762bfef3e58dbd3a5e39342e4076dd12f5", 0x1f, 0x3, 0x80, 0x0, 0x6, 0x7, 0x2, 0x1}, r4}}, 0x120) (async) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r6, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r5, &(0x7f0000002100)={0x50, 0x0, r7}, 0x50) write$FUSE_BMAP(r2, &(0x7f00000000c0)={0x18, 0x0, r7, {0x10000}}, 0x18) 19:15:17 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:17 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 19:15:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x180, "8d8d352b14c2ff4287c45dbc2f15e217ba94532fd5b0af24955e6b4afdbaa44e5eb7aeb9274a9816d4617f898ee0f3d49a323364270b8f5a3fdac87f610f93692906781dd5aa7024ac280d444c4678006a9b38f0746593274a64527f96db9ed9fd6d74952ca4cbc729ab02ef0de2c3894882fbb63d7ea69e0c8d7d2ba7a175a1860489ca41e8eecf3bf3f52f987439bc6abe77ed781cd7ab6f3dd9d6172acc38e738fa3c3fbbb0078924fc0475efb2da1b40be5c53a5b3c7b8933c2782fdcc9a7150fae941620e081d7484137da2f02c6a7cbedfe76fdc64c91efb175041ef4340ddbb1b388a52da0c5161bf442080ee3c6ebce30ce0cf1a25bcc4efbed309fd", 0x9, 0x1f, 0x3, 0x3, 0x1, 0x7, 0x72}, r2}}, 0x128) 19:15:17 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) (async) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:17 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) (async) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r4, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r4, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, &(0x7f0000000100)={{r4, 0x7fffffff, 0x1, 0x8, 0x7fff, 0x7fff, 0xfff, 0x9, 0x1, 0x0, 0x81, 0x400, 0x6, 0x3, 0x1}}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000000)={'vlan1', 0x32, 0x30}, 0x8) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2c0000ffff09000264f557282e402e4d936c91515b75ae000000000000000000000500000000000000040000d3880e46da30a85ea8e5620fc322acce34b88736027daf2be410925e32ddfb9a4c13f0af5244eda6af86766e15d9f26374e797492adf6136e0e9026686db6daf60219e492070b919f4ff0a41f40eb1"], 0x2c) (async) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2c0000ffff09000264f557282e402e4d936c91515b75ae000000000000000000000500000000000000040000d3880e46da30a85ea8e5620fc322acce34b88736027daf2be410925e32ddfb9a4c13f0af5244eda6af86766e15d9f26374e797492adf6136e0e9026686db6daf60219e492070b919f4ff0a41f40eb1"], 0x2c) 19:15:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x180, "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", 0x9, 0x1f, 0x3, 0x3, 0x1, 0x7, 0x72}, r2}}, 0x128) 19:15:17 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000140)={0x7fffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x5, "877e29374d6576"}) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x180400, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001140)=ANY=[@ANYRES64=r1, @ANYBLOB="0600000000000000020000000000000008000000000000000500000000000000d74200000000000004000000000000008000000053040000090000009e980000a0090000000000000004000000000000050000000000000001000000000000000800"/112]) 19:15:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, 0x0) (async, rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x2, 0x1ff, "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", 0x1f, 0x3, 0x80, 0x0, 0x6, 0x7, 0x2, 0x1}, r4}}, 0x120) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r6, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r5, &(0x7f0000002100)={0x50, 0x0, r7}, 0x50) (async, rerun: 64) write$FUSE_BMAP(r2, &(0x7f00000000c0)={0x18, 0x0, r7, {0x10000}}, 0x18) (rerun: 64) 19:15:17 executing program 4: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$smackfs_ipv6host(r0, 0x0, 0xb9) (async) write$smackfs_ipv6host(r0, 0x0, 0xb9) 19:15:17 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_change_rule(0xffffffffffffffff, &(0x7f0000000040)={'/sys/fs/smackfs/ipv6host\x00', 0x20, '--/', 0x20, 'al', 0x20, 'a'}, 0x23) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$smackfs_ipv6host(r1, 0x0, 0xb9) [ 1512.530719][T16237] list_del corruption. prev->next should be ffff88804f351048, but was ffff888024f125e8. (prev=ffff888021605048) [ 1512.543132][T16237] ------------[ cut here ]------------ [ 1512.548610][T16237] kernel BUG at lib/list_debug.c:64! [ 1512.553921][T16237] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1512.559998][T16237] CPU: 1 PID: 16237 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-15365-g305230142ae0 #0 [ 1512.570083][T16237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1512.580149][T16237] RIP: 0010:__list_del_entry_valid_or_report+0x10e/0x130 [ 1512.587196][T16237] Code: e8 27 9b 8a 06 0f 0b 48 c7 c7 c0 c6 bd 8b 4c 89 fe e8 16 9b 8a 06 0f 0b 48 c7 c7 20 c7 bd 8b 4c 89 fe 48 89 d9 e8 02 9b 8a 06 <0f> 0b 48 c7 c7 a0 c7 bd 8b 4c 89 fe 4c 89 f1 e8 ee 9a 8a 06 0f 0b [ 1512.606819][T16237] RSP: 0018:ffffc90015a17db0 EFLAGS: 00010046 [ 1512.612904][T16237] RAX: 000000000000006d RBX: ffff888021605048 RCX: 5061471a70cfd800 [ 1512.620890][T16237] RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000 [ 1512.628889][T16237] RBP: ffff88804f351008 R08: ffffffff8171771c R09: 1ffff92002b42f08 [ 1512.636880][T16237] R10: dffffc0000000000 R11: fffff52002b42f09 R12: dffffc0000000000 [ 1512.644872][T16237] R13: ffff88804f350000 R14: ffff888024f125e8 R15: ffff88804f351048 [ 1512.652863][T16237] FS: 0000555557223480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 1512.661806][T16237] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1512.668405][T16237] CR2: 00007f9facec66e4 CR3: 000000004fff7000 CR4: 00000000003506f0 19:15:17 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x2}, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x4080, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000140)={0x7fffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x5, "877e29374d6576"}) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x180400, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001140)=ANY=[@ANYRES64=r1, @ANYBLOB="0600000000000000020000000000000008000000000000000500000000000000d74200000000000004000000000000008000000053040000090000009e980000a0090000000000000004000000000000050000000000000001000000000000000800"/112]) 19:15:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x180, "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", 0x9, 0x1f, 0x3, 0x3, 0x1, 0x7, 0x72}, r2}}, 0x128) 19:15:18 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$smackfs_change_rule(0xffffffffffffffff, &(0x7f0000000040)={'/sys/fs/smackfs/ipv6host\x00', 0x20, '--/', 0x20, 'al', 0x20, 'a'}, 0x23) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$smackfs_ipv6host(r1, 0x0, 0xb9) openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$smackfs_change_rule(0xffffffffffffffff, &(0x7f0000000040)={'/sys/fs/smackfs/ipv6host\x00', 0x20, '--/', 0x20, 'al', 0x20, 'a'}, 0x23) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) write$smackfs_ipv6host(r1, 0x0, 0xb9) (async) 19:15:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @private2}, r1}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x180, "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", 0x9, 0x1f, 0x3, 0x3, 0x1, 0x7, 0x72}}}, 0x128) [ 1512.676398][T16237] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1512.684394][T16237] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1512.692382][T16237] Call Trace: [ 1512.695673][T16237] [ 1512.698615][T16237] ? __die_body+0x8b/0xe0 [ 1512.702971][T16237] ? die+0xa1/0xd0 [ 1512.706707][T16237] ? do_trap+0x153/0x380 [ 1512.711003][T16237] ? __list_del_entry_valid_or_report+0x10e/0x130 [ 1512.717436][T16237] ? do_error_trap+0x1dc/0x2c0 [ 1512.722229][T16237] ? __list_del_entry_valid_or_report+0x10e/0x130 [ 1512.728665][T16237] ? do_int3+0x50/0x50 [ 1512.732754][T16237] ? report_bug+0x3cd/0x500 [ 1512.737276][T16237] ? handle_invalid_op+0x34/0x40 [ 1512.742226][T16237] ? __list_del_entry_valid_or_report+0x10e/0x130 [ 1512.748653][T16237] ? exc_invalid_op+0x33/0x50 [ 1512.753345][T16237] ? asm_exc_invalid_op+0x1a/0x20 [ 1512.758404][T16237] ? __wake_up_klogd+0xcc/0x100 [ 1512.763281][T16237] ? __list_del_entry_valid_or_report+0x10e/0x130 [ 1512.769708][T16237] ptp_release+0xa8/0x1e0 [ 1512.774091][T16237] ? ptp_open+0x430/0x430 19:15:18 executing program 4: r0 = openat$smackfs_ipv6host(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) (async) write$smackfs_change_rule(0xffffffffffffffff, &(0x7f0000000040)={'/sys/fs/smackfs/ipv6host\x00', 0x20, '--/', 0x20, 'al', 0x20, 'a'}, 0x23) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$smackfs_ipv6host(r1, 0x0, 0xb9) [ 1512.778446][T16237] posix_clock_release+0x8c/0x100 [ 1512.783494][T16237] ? posix_clock_open+0x1f0/0x1f0 [ 1512.788542][T16237] __fput+0x3cc/0xa10 [ 1512.792649][T16237] __se_sys_close+0x15f/0x220 [ 1512.797355][T16237] do_syscall_64+0x44/0x110 [ 1512.801888][T16237] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1512.807810][T16237] RIP: 0033:0x7f26ace7b9da [ 1512.812240][T16237] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 1512.831859][T16237] RSP: 002b:00007fffd24be8f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1512.840293][T16237] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f26ace7b9da [ 1512.848282][T16237] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 1512.856265][T16237] RBP: 0000000000000032 R08: 0000001b30060000 R09: 00007f26acf9c05c [ 1512.864247][T16237] R10: 00007fffd24bea40 R11: 0000000000000293 R12: 00007f26aca04150 [ 1512.872235][T16237] R13: ffffffffffffffff R14: 00007f26aca00000 R15: 00000000001713c9 19:15:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000000c0)={0x11, 0x10}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004ec40)={0xfff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "7a14c0914128ed"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004fc40)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7, "cc997fc9240b81"}) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r8, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000050c40)={0x0, ""/256, 0x0}) r10 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r11, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000050e40)={0x0, ""/256, 0x0, 0x0}) r13 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r13, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r14, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000051040)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {0x0, r6}], 0x0, "98bcd9e3010d24"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000052040)={0x0}) r17 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r17, 0x81f8943c, &(0x7f0000000540)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000740)={{r18, 0xfa500000, 0xe7, 0x9, 0xffffffffffffffff, 0x6, 0x8, 0x6c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000052240)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "849d47f07f7edc"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000053240)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000053440)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000053640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000053840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000053a40)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x6, "333a8297fc280f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000054a40)={0x401, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x5, "4de3490e06eee8"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055a40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {0x0, r5}, {r8}, {r9}, {r11, r12}, {r14, r15}, {}, {r16}, {r18}, {0x0, r19}, {0x0, r20}, {}, {}, {r21, r22}, {0x0, r23}, {0x0, r24}, {}, {0x0, r25}], 0x0, "0f97f63108d562"}) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xa}}, 0x10) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000001, 0x12, r0, 0x63ca000) [ 1512.880227][T16237] [ 1512.883809][T16237] Modules linked in: [ 1512.887713][T16237] ---[ end trace 0000000000000000 ]--- [ 1512.893174][T16237] RIP: 0010:__list_del_entry_valid_or_report+0x10e/0x130 [ 1512.900211][T16237] Code: e8 27 9b 8a 06 0f 0b 48 c7 c7 c0 c6 bd 8b 4c 89 fe e8 16 9b 8a 06 0f 0b 48 c7 c7 20 c7 bd 8b 4c 89 fe 48 89 d9 e8 02 9b 8a 06 <0f> 0b 48 c7 c7 a0 c7 bd 8b 4c 89 fe 4c 89 f1 e8 ee 9a 8a 06 0f 0b [ 1512.919834][T16237] RSP: 0018:ffffc90015a17db0 EFLAGS: 00010046 [ 1512.925918][T16237] RAX: 000000000000006d RBX: ffff888021605048 RCX: 5061471a70cfd800 [ 1512.933907][T16237] RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000 [ 1512.941868][T16237] RBP: ffff88804f351008 R08: ffffffff8171771c R09: 1ffff92002b42f08 [ 1512.949826][T16237] R10: dffffc0000000000 R11: fffff52002b42f09 R12: dffffc0000000000 [ 1512.957781][T16237] R13: ffff88804f350000 R14: ffff888024f125e8 R15: ffff88804f351048 [ 1512.965736][T16237] FS: 0000555557223480(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 1512.974658][T16237] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1512.981233][T16237] CR2: 00007f9facec66e4 CR3: 000000004fff7000 CR4: 00000000003506f0 [ 1512.989210][T16237] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1512.997170][T16237] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1513.005140][T16237] Kernel panic - not syncing: Fatal exception [ 1513.011403][T16237] Kernel Offset: disabled [ 1513.015716][T16237] Rebooting in 86400 seconds..