eteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) 07:55:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) socket(0x2c, 0xa, 0x6) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00)}}, 0x18) [ 441.746009][T17371] fuse: Bad value for 'fd' [ 441.815076][T17375] fuse: Bad value for 'fd' [ 441.821412][T17374] fuse: Bad value for 'fd' [ 441.851592][T17371] fuse: Bad value for 'fd' [ 441.856614][T17375] fuse: Bad value for 'fd' 07:55:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 441.917181][T17381] fuse: Bad value for 'fd' [ 441.953323][T17381] fuse: Bad value for 'fd' 07:55:11 executing program 0: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") [ 441.975475][T17374] fuse: Bad value for 'fd' 07:55:11 executing program 1: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") 07:55:11 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() 07:55:11 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r13, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) 07:55:11 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) 07:55:11 executing program 0: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@fowner_eq}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") 07:55:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r8, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00)}}, 0x18) 07:55:11 executing program 1: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) [ 442.270781][T17388] fuse: Bad value for 'fd' [ 442.273169][T17393] fuse: Bad value for 'fd' [ 442.288794][T17392] fuse: Bad value for 'fd' [ 442.317134][T17393] fuse: Bad value for 'fd' [ 442.335402][T17388] fuse: Bad value for 'fd' [ 442.344685][T17392] fuse: Bad value for 'fd' 07:55:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) 07:55:12 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) 07:55:12 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) [ 442.427412][T17398] fuse: Bad value for 'fd' [ 442.477279][T17399] fuse: Bad value for 'fd' 07:55:12 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) 07:55:12 executing program 0: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") [ 442.546113][T17401] fuse: Bad value for 'fd' [ 442.614988][T17405] fuse: Bad value for 'fd' 07:55:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r9, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00)}}, 0x18) [ 442.638927][T17406] fuse: Bad value for 'fd' [ 442.648079][T17405] fuse: Bad value for 'fd' [ 442.654147][T17407] fuse: Bad value for 'fd' [ 442.659769][T17408] fuse: Bad value for 'fd' 07:55:12 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) [ 442.689360][T17406] fuse: Bad value for 'fd' [ 442.695542][T17408] fuse: Bad value for 'fd' [ 442.700788][T17407] fuse: Bad value for 'fd' [ 442.729061][T17410] fuse: Bad value for 'fd' 07:55:12 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) 07:55:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000b80)={{0x1, 0x1, 0x18, r14, {0x10000}}, './file0\x00'}) 07:55:12 executing program 0: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") 07:55:12 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000b80)={{0x1, 0x1, 0x18, r14, {0x10000}}, './file0\x00'}) [ 442.932364][T17414] fuse: Bad value for 'fd' [ 442.964412][T17414] fuse: Bad value for 'fd' [ 442.984856][T17420] fuse: Bad value for 'fd' [ 442.984979][T17419] fuse: Bad value for 'fd' 07:55:12 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) [ 443.038964][T17422] fuse: Bad value for 'fd' 07:55:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) 07:55:12 executing program 0: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, 0x0) [ 443.064750][T17421] fuse: Bad value for 'fd' [ 443.070901][T17419] fuse: Bad value for 'fd' [ 443.094752][T17421] fuse: Bad value for 'fd' [ 443.102017][T17422] fuse: Bad value for 'fd' 07:55:12 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) 07:55:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000b80)={{0x1, 0x1, 0x18, r14, {0x10000}}, './file0\x00'}) 07:55:12 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000b80)={{0x1, 0x1, 0x18, r14, {0x10000}}, './file0\x00'}) [ 443.272994][T17427] fuse: Bad value for 'fd' [ 443.310735][T17428] fuse: Bad value for 'fd' [ 443.328061][T17426] fuse: Bad value for 'user_id' [ 443.333855][T17427] fuse: Bad value for 'fd' [ 443.346116][T17431] fuse: Bad value for 'fd' [ 443.398113][T17432] fuse: Bad value for 'fd' [ 443.399170][T17431] fuse: Bad value for 'fd' 07:55:13 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) 07:55:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 443.443660][T17432] fuse: Bad value for 'fd' [ 443.455378][T17434] fuse: Bad value for 'fd' 07:55:13 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) [ 443.528412][T17434] fuse: Bad value for 'fd' 07:55:13 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) 07:55:13 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000b80)={{0x1, 0x1, 0x18, r14, {0x10000}}, './file0\x00'}) [ 443.614818][T17439] fuse: Bad value for 'fd' 07:55:13 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000b80)={{0x1, 0x1, 0x18, r14, {0x10000}}, './file0\x00'}) [ 443.675158][T17439] fuse: Bad value for 'fd' [ 443.675620][T17442] fuse: Bad value for 'fd' 07:55:13 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) [ 443.742926][T17442] fuse: Bad value for 'fd' [ 443.746289][T17441] fuse: Bad value for 'user_id' [ 443.769319][T17445] fuse: Bad value for 'fd' [ 443.798075][T17446] fuse: Bad value for 'fd' [ 443.805718][T17445] fuse: Bad value for 'fd' 07:55:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "549487e999d846c0ef3e5d5c35bc5279d9f49a621eef6d84a0d4dd2188b17f823f1f12be7944ab9b0794e3e6fbe6d8b3c97c00c20690afbb21e1178caa60927662fa4901fca478bc7f51ae325152dd77d97c0ccaecb3e740dcf7430b30a68db11bfa26d4be878f7658cbd77afaf4dbbd1adf5ffc43c40d2552d8c97026e295e2144969d74eef848bcaea5154b6d760d065365958f5da2176887f03eb67f12336852d3a676908fd04b414d79ebd5c24986f7d97bc83a192ea22592e9b50b0dd1947eb4d2c232c0c94f6f7ce9679d0b398eae09a6d2211cfbb96b4c33935ee74f204e4e9a495027a22bd5a0e230fcf6ab1d81dd173a9bcf5596ece11e9a48159bb5fd2605cc109e5741dda312b2e29e102d32358a7027d4f01d81df88a1c097d408f68fe32c8e0386c2befce4cf6bbd9af5d5889026b605a46b306ff23e785257563d7978b24390adf382ab84e3e34b3bbb32eee771ff0a27d1dae51c4ed9355b3003dc4c1fc2ca39cde638a2ad009e05f3eea6b217dfc25f231f4c3b3139c7b277bb858dd4d5d034287f23bc34cd30ecdc71b5eaae4bb63e21b18b067481a175b333ac46a3a02f580d43c6a5bf113fa62038580a246efc9ca467f90369f969b04ad7058b2ae5fbed94aab85fccb3ff2f45c11c4ca16086350553e8f3a78a4110050be0c6ccdc87874f5e321407ce450cb4f83bc15c38cc520ffebe86a35ce8a2bebeeaefc1cab04cd87654a1aa02e0d6017529aa337f8ef16f8002aa99be03ccabb7bc19ce7c6bef4a999ae7868023338c890cd5e20a386a9b8dc43ee5b584a87f3cc862e902afd6a3b4258cd2ad64472f4f4025d57208366409c158091fd3d07503b18885065b192bb7b0b8680400d2fa89ba0e2b169b04471bc8413db508c207f51a9e56629972d8714dbbe9aeb5045a47b7b5e6efc1824239e7ee624df4970c7111c5b4e5d77e334c94b02ba2692f1d74004b01d2143d17718489a027ec5165c2a593f2ad66621961ef98a2a7a53b5e30d6d9b77bc8511b2141cabde6021073dc6e813ba9a942e3ba6934512d9747737aa170246ee3e01f3f8ce88329f1bd5f88aeb261dc1907935d789a5c75a67faa982ab319eaf952626b6009acb7e48544c657fbdd0448ce50ec696a37a4f7927aa55e9e3aeb78154a86dd3e366dcf5371cb13562619bc64404c70052bec50923a5c5402fea86846b384c2bfc4f8392a3455550c4673d95a14171c743aa7300112ba9e21a059f668aafb4052790fd809d97a6cd69c3ead5db333f087bcfb5ffe97908531545c0704b348638c244c061b41c3b069f9778dc514fdcedbc1ad79bfc9eb6893b4cf1da9592858e39950fd9932f9b0200ddc0be2235024218a3e3dd0401c84cd73b4fc8971659d10c27a6a2ce6d3bebbaf97afe0c03eed7697fed2de9229c70cdce1e7caf46eb0edc602934a8"}, 0x418, 0x9}) 07:55:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 443.842310][T17448] fuse: Bad value for 'fd' [ 443.857919][T17446] fuse: Bad value for 'fd' 07:55:13 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r13, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) [ 443.886659][T17449] fuse: Bad value for 'fd' 07:55:13 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) 07:55:13 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) [ 443.997067][T17453] fuse: Bad value for 'fd' [ 444.035624][T17453] fuse: Bad value for 'fd' 07:55:13 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r10, &(0x7f0000000800)=""/230, 0xe6) [ 444.114953][T17457] fuse: Bad value for 'fd' [ 444.133067][T17460] fuse: Bad value for 'fd' [ 444.142848][T17457] fuse: Bad value for 'fd' [ 444.162787][T17460] fuse: Bad value for 'fd' [ 444.183491][T17455] fuse: Bad value for 'user_id' 07:55:13 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() [ 444.210275][T17462] fuse: Bad value for 'fd' [ 444.214988][T17454] fuse: Bad value for 'user_id' 07:55:13 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) [ 444.266995][T17462] fuse: Bad value for 'fd' 07:55:14 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r15, 0x1, 0x4, 0x2}, 0x48) 07:55:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) [ 444.319813][T17464] fuse: Bad value for 'fd' [ 444.354263][T17464] fuse: Bad value for 'fd' 07:55:14 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) 07:55:14 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) [ 444.454340][T17470] fuse: Bad value for 'fd' [ 444.467855][T17472] fuse: Bad value for 'fd' [ 444.477186][T17470] fuse: Bad value for 'fd' [ 444.498395][T17473] fuse: Bad value for 'fd' [ 444.509003][T17471] fuse: Bad value for 'user_id' [ 444.514911][T17472] fuse: Bad value for 'fd' 07:55:14 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) [ 444.567765][T17473] fuse: Bad value for 'fd' 07:55:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) 07:55:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) [ 444.591032][T17476] fuse: Bad value for 'fd' [ 444.601142][T17477] fuse: Bad value for 'fd' 07:55:14 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r13, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) [ 444.643932][T17476] fuse: Bad value for 'fd' [ 444.644303][T17477] fuse: Bad value for 'fd' 07:55:14 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() 07:55:14 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r13, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) [ 444.798491][T17480] fuse: Bad value for 'user_id' [ 444.845243][T17483] fuse: Bad value for 'fd' 07:55:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) [ 444.876213][T17483] fuse: Bad value for 'fd' [ 444.884457][T17488] fuse: Bad value for 'fd' [ 444.909859][T17489] fuse: Bad value for 'fd' [ 444.918902][T17488] fuse: Bad value for 'fd' [ 444.937438][T17489] fuse: Bad value for 'fd' 07:55:14 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) [ 444.966600][T17491] fuse: Bad value for 'fd' 07:55:14 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) 07:55:14 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() [ 444.992284][T17490] fuse: Bad value for 'fd' [ 445.005488][T17484] fuse: Bad value for 'user_id' 07:55:14 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() 07:55:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) [ 445.153787][T17494] fuse: Bad value for 'user_id' [ 445.188004][T17497] fuse: Bad value for 'fd' [ 445.214504][T17498] fuse: Bad value for 'fd' 07:55:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) [ 445.239318][T17497] fuse: Bad value for 'fd' [ 445.245962][T17499] fuse: Bad value for 'fd' [ 445.254237][T17498] fuse: Bad value for 'fd' [ 445.268090][T17502] fuse: Bad value for 'fd' 07:55:15 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) 07:55:15 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) 07:55:15 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) [ 445.329993][T17503] fuse: Bad value for 'fd' [ 445.349385][ T1238] ieee802154 phy0 wpan0: encryption failed: -22 [ 445.356671][ T1238] ieee802154 phy1 wpan1: encryption failed: -22 [ 445.401608][T17506] fuse: Bad value for 'user_id' [ 445.410434][T17507] fuse: Bad value for 'fd' 07:55:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 445.479082][T17504] fuse: Bad value for 'user_id' 07:55:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) [ 445.557948][T17509] fuse: Bad value for 'fd' 07:55:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) [ 445.593375][T17513] fuse: Bad value for 'fd' [ 445.594955][T17512] fuse: Bad value for 'fd' [ 445.615925][T17509] fuse: Bad value for 'fd' [ 445.621485][T17512] fuse: Bad value for 'fd' [ 445.624759][T17513] fuse: Bad value for 'fd' 07:55:15 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) 07:55:15 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) 07:55:15 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) [ 445.731333][T17516] fuse: Bad value for 'fd' [ 445.777443][T17516] fuse: Bad value for 'fd' 07:55:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00), 0x13f, 0xa}}, 0x20) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) [ 445.864258][T17521] fuse: Bad value for 'fd' [ 445.878611][T17519] fuse: Bad value for 'user_id' [ 445.889223][T17521] fuse: Bad value for 'fd' [ 445.916692][T17524] fuse: Bad value for 'fd' [ 445.937946][T17525] fuse: Bad value for 'fd' 07:55:15 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) 07:55:15 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) [ 445.967128][T17525] fuse: Bad value for 'fd' [ 445.974189][T17524] fuse: Bad value for 'fd' 07:55:15 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") 07:55:15 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) [ 446.093394][T17530] fuse: Bad value for 'fd' 07:55:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 446.146199][T17528] fuse: Bad value for 'fd' [ 446.214544][T17536] fuse: Bad value for 'fd' 07:55:15 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) [ 446.236958][T17537] fuse: Bad value for 'fd' [ 446.241657][T17538] fuse: Bad value for 'fd' [ 446.243864][T17536] fuse: Bad value for 'fd' [ 446.251057][T17535] fuse: Bad value for 'fd' [ 446.273043][T17535] fuse: Bad value for 'fd' [ 446.279266][T17538] fuse: Bad value for 'fd' [ 446.287825][T17537] fuse: Bad value for 'fd' 07:55:16 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) 07:55:16 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r4, {0x8}}, './file1\x00'}) faccessat(r8, &(0x7f0000000a00)='./file0\x00', 0x0) 07:55:16 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() geteuid() 07:55:16 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) 07:55:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 446.468080][T17542] fuse: Bad value for 'fd' [ 446.505077][T17542] fuse: Bad value for 'fd' [ 446.531939][T17545] fuse: Bad value for 'fd' [ 446.537115][T17548] fuse: Bad value for 'fd' [ 446.560814][T17548] fuse: Bad value for 'fd' [ 446.566339][T17545] fuse: Bad value for 'fd' [ 446.575319][T17550] fuse: Bad value for 'fd' 07:55:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) [ 446.583487][T17549] fuse: Bad value for 'fd' 07:55:16 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) [ 446.612780][T17550] fuse: Bad value for 'fd' 07:55:16 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r10, &(0x7f0000000800)=""/230, 0xe6) 07:55:16 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() 07:55:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 446.773012][T17555] fuse: Bad value for 'fd' [ 446.816464][T17555] fuse: Bad value for 'fd' [ 446.831184][T17558] fuse: Bad value for 'fd' [ 446.855708][T17560] fuse: Bad value for 'fd' 07:55:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) [ 446.863820][T17562] fuse: Bad value for 'fd' [ 446.866751][T17558] fuse: Bad value for 'fd' [ 446.899109][T17560] fuse: Bad value for 'fd' 07:55:16 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) 07:55:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:16 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) 07:55:16 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) 07:55:16 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() [ 447.123812][T17567] fuse: Bad value for 'fd' [ 447.135471][T17567] fuse: Bad value for 'fd' [ 447.166524][T17570] fuse: Bad value for 'fd' 07:55:16 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) [ 447.209057][T17574] fuse: Bad value for 'fd' 07:55:16 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) [ 447.229730][T17575] fuse: Bad value for 'fd' [ 447.252469][T17575] fuse: Bad value for 'fd' [ 447.266729][T17577] fuse: Bad value for 'fd' [ 447.272971][T17569] fuse: Bad value for 'fd' 07:55:17 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() 07:55:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:17 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() 07:55:17 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r10, &(0x7f0000000800)=""/230, 0xe6) [ 447.430376][T17580] fuse: Bad value for 'fd' [ 447.460941][T17581] fuse: Bad value for 'fd' 07:55:17 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) [ 447.504808][T17583] fuse: Bad value for 'fd' [ 447.520008][T17581] fuse: Bad value for 'fd' [ 447.542143][T17583] fuse: Bad value for 'fd' [ 447.550975][T17589] fuse: Bad value for 'fd' [ 447.555814][T17587] fuse: Bad value for 'fd' [ 447.575592][T17589] fuse: Bad value for 'fd' 07:55:17 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) 07:55:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r10, &(0x7f0000000800)=""/230, 0xe6) 07:55:17 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) 07:55:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:17 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) [ 447.723115][T17591] fuse: Bad value for 'fd' 07:55:17 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) [ 447.806802][T17595] fuse: Bad value for 'fd' [ 447.814562][T17597] fuse: Bad value for 'fd' [ 447.835746][T17600] fuse: Bad value for 'fd' [ 447.841205][T17595] fuse: Bad value for 'fd' [ 447.846344][T17597] fuse: Bad value for 'fd' [ 447.861024][T17599] fuse: Bad value for 'fd' [ 447.866916][T17600] fuse: Bad value for 'fd' 07:55:17 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) 07:55:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) 07:55:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) socket(0x2c, 0xa, 0x6) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 447.920461][T17599] fuse: Bad value for 'fd' 07:55:17 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() [ 448.051000][T17604] fuse: Bad value for 'fd' 07:55:17 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) 07:55:17 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) msgget(0x3, 0x100) [ 448.111505][T17610] fuse: Bad value for 'fd' [ 448.115948][T17607] fuse: Bad value for 'fd' [ 448.135988][T17611] fuse: Bad value for 'fd' [ 448.147652][T17610] fuse: Bad value for 'fd' [ 448.158440][T17607] fuse: Bad value for 'fd' [ 448.162307][T17611] fuse: Bad value for 'fd' 07:55:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:17 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() 07:55:17 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) 07:55:17 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) [ 448.338038][T17616] fuse: Bad value for 'fd' [ 448.354277][T17615] fuse: Bad value for 'fd' [ 448.387289][T17615] fuse: Bad value for 'fd' 07:55:18 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") msgget(0x3, 0x100) [ 448.425498][T17621] fuse: Bad value for 'fd' 07:55:18 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) 07:55:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 448.450901][T17623] fuse: Bad value for 'fd' [ 448.455929][T17624] fuse: Bad value for 'fd' [ 448.461241][T17621] fuse: Bad value for 'fd' [ 448.469880][T17623] fuse: Bad value for 'fd' [ 448.477700][T17624] fuse: Bad value for 'fd' 07:55:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) 07:55:18 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) 07:55:18 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") 07:55:18 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r10, &(0x7f0000000800)=""/230, 0xe6) [ 448.580263][T17627] fuse: Bad value for 'fd' [ 448.589548][T17627] fuse: Bad value for 'fd' [ 448.656215][T17628] fuse: Bad value for 'fd' 07:55:18 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) geteuid() msgget(0x3, 0x100) 07:55:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 448.753905][T17636] fuse: Bad value for 'fd' [ 448.755494][T17634] fuse: Bad value for 'fd' [ 448.775708][T17637] fuse: Bad value for 'fd' [ 448.776054][T17634] fuse: Bad value for 'fd' [ 448.797888][T17636] fuse: Bad value for 'fd' [ 448.810200][T17637] fuse: Bad value for 'fd' 07:55:18 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) [ 448.861037][T17639] fuse: Bad value for 'fd' 07:55:18 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) [ 448.894825][T17639] fuse: Bad value for 'fd' 07:55:18 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) msgget(0x3, 0x100) 07:55:18 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() geteuid() 07:55:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 449.093059][T17649] fuse: Bad value for 'fd' 07:55:18 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) msgget(0x3, 0x100) [ 449.122480][T17648] fuse: Bad value for 'fd' [ 449.125473][T17646] fuse: Bad value for 'fd' [ 449.131183][T17649] fuse: Bad value for 'fd' [ 449.146548][T17648] fuse: Bad value for 'fd' [ 449.163652][T17652] fuse: Bad value for 'fd' [ 449.170267][T17646] fuse: Bad value for 'fd' 07:55:18 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:18 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") 07:55:18 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() 07:55:18 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) 07:55:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r3, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:19 executing program 5: msgget(0x3, 0x100) [ 449.407561][T17660] fuse: Bad value for 'fd' [ 449.425776][T17661] fuse: Bad value for 'fd' [ 449.434926][T17660] fuse: Bad value for 'fd' [ 449.445728][T17663] fuse: Bad value for 'fd' 07:55:19 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 449.475537][T17661] fuse: Bad value for 'fd' [ 449.530358][T17668] fuse: Bad value for 'fd' 07:55:19 executing program 5: msgget(0x3, 0x0) 07:55:19 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) 07:55:19 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() geteuid() [ 449.570730][T17668] fuse: Bad value for 'fd' 07:55:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r3, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:19 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") [ 449.679213][T17672] fuse: Bad value for 'fd' [ 449.698072][T17673] fuse: Bad value for 'fd' [ 449.711219][T17672] fuse: Bad value for 'fd' 07:55:19 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) 07:55:19 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 449.767237][T17676] fuse: Bad value for 'fd' 07:55:19 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) 07:55:19 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() [ 449.856722][T17678] fuse: Bad value for 'fd' [ 449.897201][T17678] fuse: Bad value for 'fd' [ 449.914827][T17682] fuse: Bad value for 'fd' 07:55:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r3, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 449.962028][T17682] fuse: Bad value for 'fd' 07:55:19 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() geteuid() [ 449.982876][T17685] fuse: Bad value for 'fd' [ 449.996599][T17687] fuse: Bad value for 'fd' 07:55:19 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r3, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:19 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) [ 450.030242][T17687] fuse: Bad value for 'fd' [ 450.039753][T17688] fuse: Bad value for 'fd' 07:55:19 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) 07:55:19 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 450.165227][T17691] fuse: Bad value for 'fd' 07:55:19 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() [ 450.259782][T17697] fuse: Bad value for 'fd' 07:55:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r3, 0x5, "7eaa27", "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"}}, 0x110) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 450.301594][T17699] fuse: Bad value for 'fd' [ 450.327841][T17699] fuse: Bad value for 'fd' 07:55:20 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) 07:55:20 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() [ 450.349932][T17700] fuse: Bad value for 'fd' 07:55:20 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() geteuid() read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:20 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) [ 450.465293][T17704] fuse: Bad value for 'fd' [ 450.512324][T17706] fuse: Bad value for 'fd' 07:55:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x111, 0x9}}, 0x20) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 450.536972][T17708] fuse: Bad value for 'fd' 07:55:20 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) 07:55:20 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) msgget(0x3, 0x100) [ 450.576738][T17710] fuse: Bad value for 'fd' 07:55:20 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) 07:55:20 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) geteuid() read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 450.657877][T17712] fuse: Bad value for 'fd' 07:55:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:20 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) 07:55:20 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") msgget(0x3, 0x100) [ 450.783473][T17718] fuse: Bad value for 'fd' [ 450.788942][T17719] fuse: Bad value for 'fd' [ 450.812817][T17722] fuse: Bad value for 'fd' 07:55:20 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:20 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 450.879414][T17724] fuse: Bad value for 'fd' [ 450.916371][T17726] fuse: Bad value for 'fd' 07:55:20 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) 07:55:20 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) 07:55:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 451.042217][T17729] fuse: Bad value for 'fd' 07:55:20 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) geteuid() msgget(0x3, 0x100) [ 451.082322][T17733] fuse: Bad value for 'fd' 07:55:20 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 451.218413][T17736] fuse: Bad value for 'fd' [ 451.235867][T17739] fuse: Bad value for 'fd' 07:55:21 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) 07:55:21 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) msgget(0x3, 0x100) 07:55:21 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:21 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) [ 451.357103][T17744] fuse: Bad value for 'fd' 07:55:21 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:21 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) msgget(0x3, 0x100) [ 451.515089][T17752] fuse: Bad value for 'fd' 07:55:21 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:21 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") accept$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) [ 451.555866][T17754] fuse: Bad value for 'fd' 07:55:21 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) [ 451.619726][T17757] fuse: Bad value for 'fd' 07:55:21 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:21 executing program 3: msgget(0x3, 0x100) [ 451.804340][T17764] fuse: Bad value for 'fd' 07:55:21 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) geteuid() accept$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) [ 451.875519][T17768] fuse: Bad value for 'fd' 07:55:21 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 451.897261][T17770] fuse: Bad value for 'fd' 07:55:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:21 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) msgget(0x3, 0x100) 07:55:21 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:21 executing program 3: msgget(0x3, 0x0) 07:55:21 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) accept$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) [ 452.124234][T17778] fuse: Bad value for 'fd' [ 452.164936][T17781] fuse: Bad value for 'fd' 07:55:21 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") msgget(0x3, 0x100) 07:55:21 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:21 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:21 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:21 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) 07:55:21 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 452.380034][T17789] fuse: Bad value for 'fd' 07:55:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) geteuid() msgget(0x3, 0x100) 07:55:22 executing program 1: faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:22 executing program 4: accept$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) [ 452.507253][T17798] fuse: Bad value for 'fd' 07:55:22 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r10, &(0x7f0000000800)=""/230, 0xe6) 07:55:22 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:22 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) r5 = geteuid() r6 = geteuid() r7 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r6}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r7, &(0x7f0000000680)='./file0\x00', 0x80) 07:55:22 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x1) 07:55:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) msgget(0x3, 0x100) 07:55:22 executing program 4: accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000300)) [ 452.761996][T17807] fuse: Bad value for 'fd' [ 452.763844][T17808] fuse: Bad value for 'fd' [ 452.792497][T17807] fuse: Bad value for 'fd' 07:55:22 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) geteuid() read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 452.876628][T17813] fuse: Bad value for 'fd' 07:55:22 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() 07:55:22 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) msgget(0x3, 0x100) 07:55:22 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x0) [ 452.935232][T17813] fuse: Bad value for 'fd' 07:55:22 executing program 4: accept$packet(0xffffffffffffffff, 0x0, 0x0) 07:55:22 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:22 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 453.084632][T17822] fuse: Bad value for 'fd' [ 453.119871][T17822] fuse: Bad value for 'fd' 07:55:22 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x0) 07:55:22 executing program 2: msgget(0x3, 0x100) 07:55:22 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:22 executing program 3: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) geteuid() 07:55:22 executing program 0: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) 07:55:22 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) 07:55:23 executing program 1: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) 07:55:23 executing program 2: msgget(0x3, 0x0) 07:55:23 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:23 executing program 0: read$ptp(0xffffffffffffffff, &(0x7f0000000800)=""/230, 0xe6) [ 453.472828][T17839] fuse: Bad value for 'fd' [ 453.522027][T17843] fuse: Bad value for 'fd' [ 453.554027][T17839] fuse: Bad value for 'fd' [ 453.578339][T17845] fuse: Bad value for 'fd' 07:55:23 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x1) [ 453.612838][T17846] fuse: Bad value for 'fd' 07:55:23 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r3 = accept$packet(r2, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r6 = geteuid() r7 = geteuid() r8 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r7}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r8, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r3, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r10 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r11, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r10, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r4, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r12, 0x80503d01, &(0x7f0000000940)) [ 453.681998][T17846] fuse: Bad value for 'fd' 07:55:23 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) 07:55:23 executing program 4: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000}}, '\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x7, 0x0, 0x1, 0x6, 0x6, @random="1ca1801434f8"}, 0x14) r1 = geteuid() r2 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r1}}]}}, 0x1, 0x0, &(0x7f00000001c0)="bbf316e6b470c965b1122b9cc52b59b0f7b12968e1605e09cc3ac4fdbe1a5be056e3a657449e53c1a2b0cf1eed8dafb124cc74d412d6dbf493e2351dc6c05a942b432f32edebd4838eaa1a297885eca756e4d06188865954a698b2e50b0505139a32df37a8abbacb6d36bfaefc742beca0c62748a43928ccfcab6cf00c535e406a43a3ed1e3efe") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0xfffffffa}}, './file0\x00'}) r4 = accept$packet(r3, &(0x7f00000002c0), &(0x7f0000000300)=0x14) msgget(0x3, 0x100) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x230400, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000380), 0x5, 0x2000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6, {0x2}}, './file0\x00'}) r7 = geteuid() r8 = geteuid() r9 = syz_mount_image$fuse(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x10000, &(0x7f0000000480)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@default_permissions}, {@blksize}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '/dev/nvram\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x35, 0x38, 0x32, 0x31, 0x61, 0x39, 0x35], 0x2d, [0x63, 0x66, 0x64, 0x61], 0x2d, [0x66, 0x63, 0x34, 0x61], 0x2d, [0x33, 0x66, 0x61, 0x39], 0x2d, [0x65, 0x38, 0x65, 0x36, 0x31, 0x32, 0x62, 0x65]}}}, {@euid_lt={'euid<', r8}}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000640)="16ded82304") faccessat(r9, &(0x7f0000000680)='./file0\x00', 0x80) getsockname$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) recvfrom$packet(r4, &(0x7f00000006c0)=""/5, 0x5, 0x1, &(0x7f0000000780)={0x11, 0x0, r10, 0x1, 0x8, 0x6, @random="3de3c8296fc1"}, 0x14) r11 = geteuid() ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f00000007c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xcc3b}}, './file1\x00'}) read$ptp(r12, &(0x7f0000000800)=""/230, 0xe6) ioprio_set$uid(0x3, r11, 0x4000) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000900)={{0x1, 0x1, 0x18, r5, {0x6}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r13, 0x80503d01, &(0x7f0000000940)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5, {0x8}}, './file1\x00'}) faccessat(r9, &(0x7f0000000a00)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a40)={{0x1, 0x1, 0x18, r0, {0x9}}, './file0\x00'}) geteuid() ioctl$AUTOFS_DEV_IOCTL_READY(r14, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf7ec}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r14, 0xc0189377, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r2, {0x7fffffff, 0x5}}, './file0\x00'}) 07:55:23 executing program 0: read$ptp(0xffffffffffffffff, 0x0, 0x0) 07:55:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) 07:55:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "549487e999d846c0ef3e5d5c35bc5279d9f49a621eef6d84a0d4dd2188b17f823f1f12be7944ab9b0794e3e6fbe6d8b3c97c00c20690afbb21e1178caa60927662fa4901fca478bc7f51ae325152dd77d97c0ccaecb3e740dcf7430b30a68db11bfa26d4be878f7658cbd77afaf4dbbd1adf5ffc43c40d2552d8c97026e295e2144969d74eef848bcaea5154b6d760d065365958f5da2176887f03eb67f12336852d3a676908fd04b414d79ebd5c24986f7d97bc83a192ea22592e9b50b0dd1947eb4d2c232c0c94f6f7ce9679d0b398eae09a6d2211cfbb96b4c33935ee74f204e4e9a495027a22bd5a0e230fcf6ab1d81dd173a9bcf5596ece11e9a48159bb5fd2605cc109e5741dda312b2e29e102d32358a7027d4f01d81df88a1c097d408f68fe32c8e0386c2befce4cf6bbd9af5d5889026b605a46b306ff23e785257563d7978b24390adf382ab84e3e34b3bbb32eee771ff0a27d1dae51c4ed9355b3003dc4c1fc2ca39cde638a2ad009e05f3eea6b217dfc25f231f4c3b3139c7b277bb858dd4d5d034287f23bc34cd30ecdc71b5eaae4bb63e21b18b067481a175b333ac46a3a02f580d43c6a5bf113fa62038580a246efc9ca467f90369f969b04ad7058b2ae5fbed94aab85fccb3ff2f45c11c4ca16086350553e8f3a78a4110050be0c6ccdc87874f5e321407ce450cb4f83bc15c38cc520ffebe86a35ce8a2bebeeaefc1cab04cd87654a1aa02e0d6017529aa337f8ef16f8002aa99be03ccabb7bc19ce7c6bef4a999ae7868023338c890cd5e20a386a9b8dc43ee5b584a87f3cc862e902afd6a3b4258cd2ad64472f4f4025d57208366409c158091fd3d07503b18885065b192bb7b0b8680400d2fa89ba0e2b169b04471bc8413db508c207f51a9e56629972d8714dbbe9aeb5045a47b7b5e6efc1824239e7ee624df4970c7111c5b4e5d77e334c94b02ba2692f1d74004b01d2143d17718489a027ec5165c2a593f2ad66621961ef98a2a7a53b5e30d6d9b77bc8511b2141cabde6021073dc6e813ba9a942e3ba6934512d9747737aa170246ee3e01f3f8ce88329f1bd5f88aeb261dc1907935d789a5c75a67faa982ab319eaf952626b6009acb7e48544c657fbdd0448ce50ec696a37a4f7927aa55e9e3aeb78154a86dd3e366dcf5371cb13562619bc64404c70052bec50923a5c5402fea86846b384c2bfc4f8392a3455550c4673d95a14171c743aa7300112ba9e21a059f668aafb4052790fd809d97a6cd69c3ead5db333f087bcfb5ffe97908531545c0704b348638c244c061b41c3b069f9778dc514fdcedbc1ad79bfc9eb6893b4cf1da9592858e39950fd9932f9b0200ddc0be2235024218a3e3dd0401c84cd73b4fc8971659d10c27a6a2ce6d3bebbaf97afe0c03eed7697fed2de9229c70cdce1e7caf46eb0edc602934a8"}, 0x418, 0x9}) [ 453.917305][T17861] fuse: Bad value for 'fd' [ 453.925840][T17859] fuse: Bad value for 'fd' 07:55:23 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "549487e999d846c0ef3e5d5c35bc5279d9f49a621eef6d84a0d4dd2188b17f823f1f12be7944ab9b0794e3e6fbe6d8b3c97c00c20690afbb21e1178caa60927662fa4901fca478bc7f51ae325152dd77d97c0ccaecb3e740dcf7430b30a68db11bfa26d4be878f7658cbd77afaf4dbbd1adf5ffc43c40d2552d8c97026e295e2144969d74eef848bcaea5154b6d760d065365958f5da2176887f03eb67f12336852d3a676908fd04b414d79ebd5c24986f7d97bc83a192ea22592e9b50b0dd1947eb4d2c232c0c94f6f7ce9679d0b398eae09a6d2211cfbb96b4c33935ee74f204e4e9a495027a22bd5a0e230fcf6ab1d81dd173a9bcf5596ece11e9a48159bb5fd2605cc109e5741dda312b2e29e102d32358a7027d4f01d81df88a1c097d408f68fe32c8e0386c2befce4cf6bbd9af5d5889026b605a46b306ff23e785257563d7978b24390adf382ab84e3e34b3bbb32eee771ff0a27d1dae51c4ed9355b3003dc4c1fc2ca39cde638a2ad009e05f3eea6b217dfc25f231f4c3b3139c7b277bb858dd4d5d034287f23bc34cd30ecdc71b5eaae4bb63e21b18b067481a175b333ac46a3a02f580d43c6a5bf113fa62038580a246efc9ca467f90369f969b04ad7058b2ae5fbed94aab85fccb3ff2f45c11c4ca16086350553e8f3a78a4110050be0c6ccdc87874f5e321407ce450cb4f83bc15c38cc520ffebe86a35ce8a2bebeeaefc1cab04cd87654a1aa02e0d6017529aa337f8ef16f8002aa99be03ccabb7bc19ce7c6bef4a999ae7868023338c890cd5e20a386a9b8dc43ee5b584a87f3cc862e902afd6a3b4258cd2ad64472f4f4025d57208366409c158091fd3d07503b18885065b192bb7b0b8680400d2fa89ba0e2b169b04471bc8413db508c207f51a9e56629972d8714dbbe9aeb5045a47b7b5e6efc1824239e7ee624df4970c7111c5b4e5d77e334c94b02ba2692f1d74004b01d2143d17718489a027ec5165c2a593f2ad66621961ef98a2a7a53b5e30d6d9b77bc8511b2141cabde6021073dc6e813ba9a942e3ba6934512d9747737aa170246ee3e01f3f8ce88329f1bd5f88aeb261dc1907935d789a5c75a67faa982ab319eaf952626b6009acb7e48544c657fbdd0448ce50ec696a37a4f7927aa55e9e3aeb78154a86dd3e366dcf5371cb13562619bc64404c70052bec50923a5c5402fea86846b384c2bfc4f8392a3455550c4673d95a14171c743aa7300112ba9e21a059f668aafb4052790fd809d97a6cd69c3ead5db333f087bcfb5ffe97908531545c0704b348638c244c061b41c3b069f9778dc514fdcedbc1ad79bfc9eb6893b4cf1da9592858e39950fd9932f9b0200ddc0be2235024218a3e3dd0401c84cd73b4fc8971659d10c27a6a2ce6d3bebbaf97afe0c03eed7697fed2de9229c70cdce1e7caf46eb0edc602934a8"}, 0x418, 0x9}) [ 453.963488][T17859] fuse: Bad value for 'fd' [ 453.977239][T17861] fuse: Bad value for 'fd' 07:55:23 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 454.026976][T17860] fuse: Bad value for 'user_id' 07:55:23 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "549487e999d846c0ef3e5d5c35bc5279d9f49a621eef6d84a0d4dd2188b17f823f1f12be7944ab9b0794e3e6fbe6d8b3c97c00c20690afbb21e1178caa60927662fa4901fca478bc7f51ae325152dd77d97c0ccaecb3e740dcf7430b30a68db11bfa26d4be878f7658cbd77afaf4dbbd1adf5ffc43c40d2552d8c97026e295e2144969d74eef848bcaea5154b6d760d065365958f5da2176887f03eb67f12336852d3a676908fd04b414d79ebd5c24986f7d97bc83a192ea22592e9b50b0dd1947eb4d2c232c0c94f6f7ce9679d0b398eae09a6d2211cfbb96b4c33935ee74f204e4e9a495027a22bd5a0e230fcf6ab1d81dd173a9bcf5596ece11e9a48159bb5fd2605cc109e5741dda312b2e29e102d32358a7027d4f01d81df88a1c097d408f68fe32c8e0386c2befce4cf6bbd9af5d5889026b605a46b306ff23e785257563d7978b24390adf382ab84e3e34b3bbb32eee771ff0a27d1dae51c4ed9355b3003dc4c1fc2ca39cde638a2ad009e05f3eea6b217dfc25f231f4c3b3139c7b277bb858dd4d5d034287f23bc34cd30ecdc71b5eaae4bb63e21b18b067481a175b333ac46a3a02f580d43c6a5bf113fa62038580a246efc9ca467f90369f969b04ad7058b2ae5fbed94aab85fccb3ff2f45c11c4ca16086350553e8f3a78a4110050be0c6ccdc87874f5e321407ce450cb4f83bc15c38cc520ffebe86a35ce8a2bebeeaefc1cab04cd87654a1aa02e0d6017529aa337f8ef16f8002aa99be03ccabb7bc19ce7c6bef4a999ae7868023338c890cd5e20a386a9b8dc43ee5b584a87f3cc862e902afd6a3b4258cd2ad64472f4f4025d57208366409c158091fd3d07503b18885065b192bb7b0b8680400d2fa89ba0e2b169b04471bc8413db508c207f51a9e56629972d8714dbbe9aeb5045a47b7b5e6efc1824239e7ee624df4970c7111c5b4e5d77e334c94b02ba2692f1d74004b01d2143d17718489a027ec5165c2a593f2ad66621961ef98a2a7a53b5e30d6d9b77bc8511b2141cabde6021073dc6e813ba9a942e3ba6934512d9747737aa170246ee3e01f3f8ce88329f1bd5f88aeb261dc1907935d789a5c75a67faa982ab319eaf952626b6009acb7e48544c657fbdd0448ce50ec696a37a4f7927aa55e9e3aeb78154a86dd3e366dcf5371cb13562619bc64404c70052bec50923a5c5402fea86846b384c2bfc4f8392a3455550c4673d95a14171c743aa7300112ba9e21a059f668aafb4052790fd809d97a6cd69c3ead5db333f087bcfb5ffe97908531545c0704b348638c244c061b41c3b069f9778dc514fdcedbc1ad79bfc9eb6893b4cf1da9592858e39950fd9932f9b0200ddc0be2235024218a3e3dd0401c84cd73b4fc8971659d10c27a6a2ce6d3bebbaf97afe0c03eed7697fed2de9229c70cdce1e7caf46eb0edc602934a8"}, 0x418, 0x9}) [ 454.091081][T17863] fuse: Bad value for 'user_id' 07:55:23 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) 07:55:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "549487e999d846c0ef3e5d5c35bc5279d9f49a621eef6d84a0d4dd2188b17f823f1f12be7944ab9b0794e3e6fbe6d8b3c97c00c20690afbb21e1178caa60927662fa4901fca478bc7f51ae325152dd77d97c0ccaecb3e740dcf7430b30a68db11bfa26d4be878f7658cbd77afaf4dbbd1adf5ffc43c40d2552d8c97026e295e2144969d74eef848bcaea5154b6d760d065365958f5da2176887f03eb67f12336852d3a676908fd04b414d79ebd5c24986f7d97bc83a192ea22592e9b50b0dd1947eb4d2c232c0c94f6f7ce9679d0b398eae09a6d2211cfbb96b4c33935ee74f204e4e9a495027a22bd5a0e230fcf6ab1d81dd173a9bcf5596ece11e9a48159bb5fd2605cc109e5741dda312b2e29e102d32358a7027d4f01d81df88a1c097d408f68fe32c8e0386c2befce4cf6bbd9af5d5889026b605a46b306ff23e785257563d7978b24390adf382ab84e3e34b3bbb32eee771ff0a27d1dae51c4ed9355b3003dc4c1fc2ca39cde638a2ad009e05f3eea6b217dfc25f231f4c3b3139c7b277bb858dd4d5d034287f23bc34cd30ecdc71b5eaae4bb63e21b18b067481a175b333ac46a3a02f580d43c6a5bf113fa62038580a246efc9ca467f90369f969b04ad7058b2ae5fbed94aab85fccb3ff2f45c11c4ca16086350553e8f3a78a4110050be0c6ccdc87874f5e321407ce450cb4f83bc15c38cc520ffebe86a35ce8a2bebeeaefc1cab04cd87654a1aa02e0d6017529aa337f8ef16f8002aa99be03ccabb7bc19ce7c6bef4a999ae7868023338c890cd5e20a386a9b8dc43ee5b584a87f3cc862e902afd6a3b4258cd2ad64472f4f4025d57208366409c158091fd3d07503b18885065b192bb7b0b8680400d2fa89ba0e2b169b04471bc8413db508c207f51a9e56629972d8714dbbe9aeb5045a47b7b5e6efc1824239e7ee624df4970c7111c5b4e5d77e334c94b02ba2692f1d74004b01d2143d17718489a027ec5165c2a593f2ad66621961ef98a2a7a53b5e30d6d9b77bc8511b2141cabde6021073dc6e813ba9a942e3ba6934512d9747737aa170246ee3e01f3f8ce88329f1bd5f88aeb261dc1907935d789a5c75a67faa982ab319eaf952626b6009acb7e48544c657fbdd0448ce50ec696a37a4f7927aa55e9e3aeb78154a86dd3e366dcf5371cb13562619bc64404c70052bec50923a5c5402fea86846b384c2bfc4f8392a3455550c4673d95a14171c743aa7300112ba9e21a059f668aafb4052790fd809d97a6cd69c3ead5db333f087bcfb5ffe97908531545c0704b348638c244c061b41c3b069f9778dc514fdcedbc1ad79bfc9eb6893b4cf1da9592858e39950fd9932f9b0200ddc0be2235024218a3e3dd0401c84cd73b4fc8971659d10c27a6a2ce6d3bebbaf97afe0c03eed7697fed2de9229c70cdce1e7caf46eb0edc602934a8"}, 0x418, 0x9}) [ 454.290684][T17867] fuse: Bad value for 'user_id' [ 454.297041][T17866] fuse: Bad value for 'user_id' 07:55:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 454.355489][T17870] fuse: Bad value for 'user_id' [ 454.408659][T17872] fuse: Bad value for 'user_id' [ 454.415263][T17873] fuse: Bad value for 'user_id' 07:55:24 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) 07:55:24 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) 07:55:24 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 454.534842][T17875] fuse: Bad value for 'user_id' 07:55:24 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) 07:55:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 454.640092][T17877] fuse: Bad value for 'user_id' 07:55:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 454.778665][T17880] fuse: Bad value for 'user_id' [ 454.793708][T17881] fuse: Bad value for 'user_id' [ 454.841663][T17883] fuse: Bad value for 'user_id' 07:55:24 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") [ 454.865314][T17886] fuse: Bad value for 'user_id' 07:55:24 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") 07:55:24 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") [ 454.899584][T17887] fuse: Bad value for 'user_id' 07:55:24 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) 07:55:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 455.133443][T17889] fuse: Bad value for 'user_id' [ 455.155557][T17893] fuse: Bad value for 'fd' 07:55:24 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") [ 455.188933][T17892] fuse: Bad value for 'fd' [ 455.194256][T17895] fuse: Bad value for 'fd' [ 455.215862][T17897] fuse: Bad value for 'user_id' 07:55:24 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") 07:55:24 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") 07:55:24 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") 07:55:25 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) [ 455.335268][T17899] fuse: Bad value for 'user_id' 07:55:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000001600)={&(0x7f00000011c0)={{@host, 0x1000}, {@host, 0x4}, 0x400, "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"}, 0x418, 0x9}) [ 455.515586][T17901] fuse: Bad value for 'fd' [ 455.534970][T17908] fuse: Bad value for 'user_id' [ 455.542504][T17906] fuse: Bad value for 'fd' [ 455.553099][T17905] fuse: Bad value for 'fd' 07:55:25 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") [ 455.588346][T17909] fuse: Bad value for 'fd' 07:55:25 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) 07:55:25 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") 07:55:25 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") 07:55:25 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") [ 455.765053][T17911] fuse: Bad value for 'user_id' 07:55:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) getsockname$packet(r13, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000001140)=0x14) [ 455.826521][T17913] fuse: Bad value for 'fd' 07:55:25 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "07511879bae02164e040131e0bdde00ba1cb136c1cce6e336b47067e0bf086cd6f064ebfd000a6a252de229bdf2a42544ded921efd2dada89ba61d3d1f6d78fdbafe04fecf523c4154bd3f4bebd6632e29e6ac485a7a25ba665cd941990e2607e8988092cf998a7205eeb5141b6507052791c34af84ef46a68fb7385105f508427c10119c716f471f16b429f6f578723667150d4da6b54ec8a6ff44950044269f0dcaffc5a289f0489d39c6847160038092cfa1deb40166b924908d46dadb2b2cf38e516008c19e612c181a3d6da0fa9942be3389832963bc53bcb4c8f8c9680fd230ccb77b3d8a6f9564af9531353d8ec1604357f136cdf637d35c388d6c0ef579b0a298b70a7701822c78d5edea32dd7eb5844cdb9cccfd380d9d20ae1d9b587bef7c6b65c5f99a9b975f0201c3db4e2fffe923e4c2111200431349da14d0ea84c8ce67a682695b902b4e243948078833515075408a57a3e0fe7b9606612e2f08f0bf59cda3d356c84482d2b3658b28d3b63712e827297e49ff324123765ec9b2eefe2a0257a48f20bdfe3dd673a5ebd5386e89fcf6944d96e871eada3c55f7ca27f964515b012c30cd29772eefd4a017a1093a8df5d188a802690797472f6226eb6dfe2606dd40b29b284dec375c3a9ea3577f08f7ca3d05044326b49a69ded000c658630a17275898981357a66e063b6bc6f7eb7400d8255614fc1c76a22c525fa0d5cfc9748ab9e8cc9a026bf2e0ff8f6207834dff05fa42402349362a9cc3e1da9ad9ca27d735b780408321e58fbed97e52c0733c8737322be76efd3314aec8973f9db7ee6d0eca1a5c5f0c87378d40d1cc16eb36ec7fb761524c9a587c99baed0e7756d85bb522df3974072b4ad04fb27c30a0ea97d7303541eb104c7b8dcfb3472d525c576073ad34f548bb2da2d4dec104ecd16ef1048fe515664f55cc251553adb11bd0219ba73f510d1ef4629ebda106bd0176e9d4d6ca698f5e6e2820ce02c33516207409541f6807a9a87e6b8af2ed6cbd5cf7fafc2e32e479c85ab04fc8de5016e0e13efb389f36c0d0e3ed4e7d1da1c2be26ad2d98578e457bd13b217971dbcc9e11fbea966c2ff744fbf42e64d72672a91b472f97652d98f67f50ef7ac911af2b1e148fadc443df7d4af77b5db43d768b93fa807909fb21b7b07b90e9905ad2c1ebd6d75d1cac8bf484f22088765bbe16406b02a7b86df200e83fe998d69dfcb918e88d4f4c8f67c7322df7c8ab3454006952438d470f5fa72a5cbb28423a4b762f26423715b66e7c7b66e398094e646c9a73cd8749d6333ff6614c75436e38618a3f38c92d1cfe72a72c9a55de0564fcde9d21ada07f2c27e511e87b44ea03d9cb7cb78a2fe4a832146f43b639fca3601fb65a8795b6d15c876c959d4a81fbee0af628d2a1e8c05f00b94a3ccf729dbdc96329d574f53e9"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') geteuid() [ 455.918391][T17918] fuse: Bad value for 'user_id' [ 455.923910][T17917] fuse: Bad value for 'fd' 07:55:25 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) [ 455.999900][T17919] fuse: Bad value for 'fd' 07:55:25 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') geteuid() 07:55:25 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") [ 456.032353][T17921] fuse: Bad value for 'fd' [ 456.044359][T17923] fuse: Bad value for 'user_id' 07:55:25 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') r8 = geteuid() syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file1\x00', 0x80, &(0x7f0000000e40)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@allow_other}, {@default_permissions}, {@allow_other}], [{@smackfsdef={'smackfsdef', 0x3d, '%@++'}}, {@dont_appraise}, {@euid_gt={'euid>', r8}}, {@audit}, {@appraise_type}]}}, 0x1, 0x0, &(0x7f0000000fc0)="d28e48573d87e049a5b897723f089bb5cdfb128f17f303071c7f05889c2f7e9af9e3889743fe32a99da8b090f069ccc8e6d801a898b7c41c4656664d3d29844e0f5581a4f44f3f2973f03db13b4c2729aaf16c493f1bf2e945a32aca1ce426fc5008e85f0a20b9af6d00a64e46723345a6d0f095eaf944852acc1d0e43f8a11825fc67e30ad498fb82a5db04d600f759b1cdd0e0debce395c888a85c1f5f07a6103e14d436390b63ace04cb4ccbb") 07:55:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) ioctl$SW_SYNC_IOC_CREATE_FENCE(r13, 0xc0285700, &(0x7f00000010c0)={0x9, "8b075bf3c742db36e53083e24f7870b113e8b8a89d4440c341a5a7c0917fdde6"}) [ 456.214843][T17929] fuse: Bad value for 'user_id' 07:55:25 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "07511879bae02164e040131e0bdde00ba1cb136c1cce6e336b47067e0bf086cd6f064ebfd000a6a252de229bdf2a42544ded921efd2dada89ba61d3d1f6d78fdbafe04fecf523c4154bd3f4bebd6632e29e6ac485a7a25ba665cd941990e2607e8988092cf998a7205eeb5141b6507052791c34af84ef46a68fb7385105f508427c10119c716f471f16b429f6f578723667150d4da6b54ec8a6ff44950044269f0dcaffc5a289f0489d39c6847160038092cfa1deb40166b924908d46dadb2b2cf38e516008c19e612c181a3d6da0fa9942be3389832963bc53bcb4c8f8c9680fd230ccb77b3d8a6f9564af9531353d8ec1604357f136cdf637d35c388d6c0ef579b0a298b70a7701822c78d5edea32dd7eb5844cdb9cccfd380d9d20ae1d9b587bef7c6b65c5f99a9b975f0201c3db4e2fffe923e4c2111200431349da14d0ea84c8ce67a682695b902b4e243948078833515075408a57a3e0fe7b9606612e2f08f0bf59cda3d356c84482d2b3658b28d3b63712e827297e49ff324123765ec9b2eefe2a0257a48f20bdfe3dd673a5ebd5386e89fcf6944d96e871eada3c55f7ca27f964515b012c30cd29772eefd4a017a1093a8df5d188a802690797472f6226eb6dfe2606dd40b29b284dec375c3a9ea3577f08f7ca3d05044326b49a69ded000c658630a17275898981357a66e063b6bc6f7eb7400d8255614fc1c76a22c525fa0d5cfc9748ab9e8cc9a026bf2e0ff8f6207834dff05fa42402349362a9cc3e1da9ad9ca27d735b780408321e58fbed97e52c0733c8737322be76efd3314aec8973f9db7ee6d0eca1a5c5f0c87378d40d1cc16eb36ec7fb761524c9a587c99baed0e7756d85bb522df3974072b4ad04fb27c30a0ea97d7303541eb104c7b8dcfb3472d525c576073ad34f548bb2da2d4dec104ecd16ef1048fe515664f55cc251553adb11bd0219ba73f510d1ef4629ebda106bd0176e9d4d6ca698f5e6e2820ce02c33516207409541f6807a9a87e6b8af2ed6cbd5cf7fafc2e32e479c85ab04fc8de5016e0e13efb389f36c0d0e3ed4e7d1da1c2be26ad2d98578e457bd13b217971dbcc9e11fbea966c2ff744fbf42e64d72672a91b472f97652d98f67f50ef7ac911af2b1e148fadc443df7d4af77b5db43d768b93fa807909fb21b7b07b90e9905ad2c1ebd6d75d1cac8bf484f22088765bbe16406b02a7b86df200e83fe998d69dfcb918e88d4f4c8f67c7322df7c8ab3454006952438d470f5fa72a5cbb28423a4b762f26423715b66e7c7b66e398094e646c9a73cd8749d6333ff6614c75436e38618a3f38c92d1cfe72a72c9a55de0564fcde9d21ada07f2c27e511e87b44ea03d9cb7cb78a2fe4a832146f43b639fca3601fb65a8795b6d15c876c959d4a81fbee0af628d2a1e8c05f00b94a3ccf729dbdc96329d574f53e9"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') geteuid() 07:55:25 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') 07:55:25 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) 07:55:26 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) geteuid() [ 456.425609][T17933] fuse: Bad value for 'fd' [ 456.440195][T17937] fuse: Bad value for 'user_id' [ 456.450059][T17935] fuse: Bad value for 'fd' 07:55:26 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') geteuid() 07:55:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000001080)={{0x1, 0x1, 0x18, r1, {0x7ff}}, './file0/file0\x00'}) 07:55:26 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) symlinkat(&(0x7f0000000d00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d80)='./file1\x00') 07:55:26 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') geteuid() [ 456.595682][T17941] fuse: Bad value for 'user_id' 07:55:26 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") 07:55:26 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "07511879bae02164e040131e0bdde00ba1cb136c1cce6e336b47067e0bf086cd6f064ebfd000a6a252de229bdf2a42544ded921efd2dada89ba61d3d1f6d78fdbafe04fecf523c4154bd3f4bebd6632e29e6ac485a7a25ba665cd941990e2607e8988092cf998a7205eeb5141b6507052791c34af84ef46a68fb7385105f508427c10119c716f471f16b429f6f578723667150d4da6b54ec8a6ff44950044269f0dcaffc5a289f0489d39c6847160038092cfa1deb40166b924908d46dadb2b2cf38e516008c19e612c181a3d6da0fa9942be3389832963bc53bcb4c8f8c9680fd230ccb77b3d8a6f9564af9531353d8ec1604357f136cdf637d35c388d6c0ef579b0a298b70a7701822c78d5edea32dd7eb5844cdb9cccfd380d9d20ae1d9b587bef7c6b65c5f99a9b975f0201c3db4e2fffe923e4c2111200431349da14d0ea84c8ce67a682695b902b4e243948078833515075408a57a3e0fe7b9606612e2f08f0bf59cda3d356c84482d2b3658b28d3b63712e827297e49ff324123765ec9b2eefe2a0257a48f20bdfe3dd673a5ebd5386e89fcf6944d96e871eada3c55f7ca27f964515b012c30cd29772eefd4a017a1093a8df5d188a802690797472f6226eb6dfe2606dd40b29b284dec375c3a9ea3577f08f7ca3d05044326b49a69ded000c658630a17275898981357a66e063b6bc6f7eb7400d8255614fc1c76a22c525fa0d5cfc9748ab9e8cc9a026bf2e0ff8f6207834dff05fa42402349362a9cc3e1da9ad9ca27d735b780408321e58fbed97e52c0733c8737322be76efd3314aec8973f9db7ee6d0eca1a5c5f0c87378d40d1cc16eb36ec7fb761524c9a587c99baed0e7756d85bb522df3974072b4ad04fb27c30a0ea97d7303541eb104c7b8dcfb3472d525c576073ad34f548bb2da2d4dec104ecd16ef1048fe515664f55cc251553adb11bd0219ba73f510d1ef4629ebda106bd0176e9d4d6ca698f5e6e2820ce02c33516207409541f6807a9a87e6b8af2ed6cbd5cf7fafc2e32e479c85ab04fc8de5016e0e13efb389f36c0d0e3ed4e7d1da1c2be26ad2d98578e457bd13b217971dbcc9e11fbea966c2ff744fbf42e64d72672a91b472f97652d98f67f50ef7ac911af2b1e148fadc443df7d4af77b5db43d768b93fa807909fb21b7b07b90e9905ad2c1ebd6d75d1cac8bf484f22088765bbe16406b02a7b86df200e83fe998d69dfcb918e88d4f4c8f67c7322df7c8ab3454006952438d470f5fa72a5cbb28423a4b762f26423715b66e7c7b66e398094e646c9a73cd8749d6333ff6614c75436e38618a3f38c92d1cfe72a72c9a55de0564fcde9d21ada07f2c27e511e87b44ea03d9cb7cb78a2fe4a832146f43b639fca3601fb65a8795b6d15c876c959d4a81fbee0af628d2a1e8c05f00b94a3ccf729dbdc96329d574f53e9"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) geteuid() 07:55:26 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') 07:55:26 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) r7 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r7, &(0x7f0000000d80)='./file1\x00') [ 456.809458][T17951] fuse: Bad value for 'user_id' 07:55:26 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) symlinkat(&(0x7f0000000d00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d80)='./file1\x00') 07:55:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) r12 = syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") faccessat(r12, &(0x7f0000001040)='./file0\x00', 0x1) [ 456.928256][T17953] fuse: Bad value for 'user_id' 07:55:26 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) 07:55:26 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) geteuid() 07:55:26 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "07511879bae02164e040131e0bdde00ba1cb136c1cce6e336b47067e0bf086cd6f064ebfd000a6a252de229bdf2a42544ded921efd2dada89ba61d3d1f6d78fdbafe04fecf523c4154bd3f4bebd6632e29e6ac485a7a25ba665cd941990e2607e8988092cf998a7205eeb5141b6507052791c34af84ef46a68fb7385105f508427c10119c716f471f16b429f6f578723667150d4da6b54ec8a6ff44950044269f0dcaffc5a289f0489d39c6847160038092cfa1deb40166b924908d46dadb2b2cf38e516008c19e612c181a3d6da0fa9942be3389832963bc53bcb4c8f8c9680fd230ccb77b3d8a6f9564af9531353d8ec1604357f136cdf637d35c388d6c0ef579b0a298b70a7701822c78d5edea32dd7eb5844cdb9cccfd380d9d20ae1d9b587bef7c6b65c5f99a9b975f0201c3db4e2fffe923e4c2111200431349da14d0ea84c8ce67a682695b902b4e243948078833515075408a57a3e0fe7b9606612e2f08f0bf59cda3d356c84482d2b3658b28d3b63712e827297e49ff324123765ec9b2eefe2a0257a48f20bdfe3dd673a5ebd5386e89fcf6944d96e871eada3c55f7ca27f964515b012c30cd29772eefd4a017a1093a8df5d188a802690797472f6226eb6dfe2606dd40b29b284dec375c3a9ea3577f08f7ca3d05044326b49a69ded000c658630a17275898981357a66e063b6bc6f7eb7400d8255614fc1c76a22c525fa0d5cfc9748ab9e8cc9a026bf2e0ff8f6207834dff05fa42402349362a9cc3e1da9ad9ca27d735b780408321e58fbed97e52c0733c8737322be76efd3314aec8973f9db7ee6d0eca1a5c5f0c87378d40d1cc16eb36ec7fb761524c9a587c99baed0e7756d85bb522df3974072b4ad04fb27c30a0ea97d7303541eb104c7b8dcfb3472d525c576073ad34f548bb2da2d4dec104ecd16ef1048fe515664f55cc251553adb11bd0219ba73f510d1ef4629ebda106bd0176e9d4d6ca698f5e6e2820ce02c33516207409541f6807a9a87e6b8af2ed6cbd5cf7fafc2e32e479c85ab04fc8de5016e0e13efb389f36c0d0e3ed4e7d1da1c2be26ad2d98578e457bd13b217971dbcc9e11fbea966c2ff744fbf42e64d72672a91b472f97652d98f67f50ef7ac911af2b1e148fadc443df7d4af77b5db43d768b93fa807909fb21b7b07b90e9905ad2c1ebd6d75d1cac8bf484f22088765bbe16406b02a7b86df200e83fe998d69dfcb918e88d4f4c8f67c7322df7c8ab3454006952438d470f5fa72a5cbb28423a4b762f26423715b66e7c7b66e398094e646c9a73cd8749d6333ff6614c75436e38618a3f38c92d1cfe72a72c9a55de0564fcde9d21ada07f2c27e511e87b44ea03d9cb7cb78a2fe4a832146f43b639fca3601fb65a8795b6d15c876c959d4a81fbee0af628d2a1e8c05f00b94a3ccf729dbdc96329d574f53e9"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:26 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) symlinkat(&(0x7f0000000d00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000d80)='./file1\x00') 07:55:26 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') [ 457.167248][T17963] fuse: Bad value for 'user_id' 07:55:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) syz_mount_image$fuse(&(0x7f0000000dc0), &(0x7f0000000e00)='./file0\x00', 0x800000, &(0x7f0000000e40)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@seclabel}]}}, 0x0, 0x0, &(0x7f0000000f80)="4efa6fd532282fda1969eface6159a18ff6a40008a3f9daf0d1a8a613279307d08d637b28a52293cccf42d1df4fe04602fff16bb4103d6886447b5313ff0b59e8793e6c5d93ad18dce70fba93d9d62ba9cf7dc98a2864cbd9e787e50193e34629f63fadbad2b38e50615410d6d745e8f4dc516f4643ffa63d48d10e10d1b5e5eb3eb5805ac093eccff5367de86c1cc42ca7c5e01d83edf1400da1bf1dc1c4760892ccd30ef41") 07:55:27 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "07511879bae02164e040131e0bdde00ba1cb136c1cce6e336b47067e0bf086cd6f064ebfd000a6a252de229bdf2a42544ded921efd2dada89ba61d3d1f6d78fdbafe04fecf523c4154bd3f4bebd6632e29e6ac485a7a25ba665cd941990e2607e8988092cf998a7205eeb5141b6507052791c34af84ef46a68fb7385105f508427c10119c716f471f16b429f6f578723667150d4da6b54ec8a6ff44950044269f0dcaffc5a289f0489d39c6847160038092cfa1deb40166b924908d46dadb2b2cf38e516008c19e612c181a3d6da0fa9942be3389832963bc53bcb4c8f8c9680fd230ccb77b3d8a6f9564af9531353d8ec1604357f136cdf637d35c388d6c0ef579b0a298b70a7701822c78d5edea32dd7eb5844cdb9cccfd380d9d20ae1d9b587bef7c6b65c5f99a9b975f0201c3db4e2fffe923e4c2111200431349da14d0ea84c8ce67a682695b902b4e243948078833515075408a57a3e0fe7b9606612e2f08f0bf59cda3d356c84482d2b3658b28d3b63712e827297e49ff324123765ec9b2eefe2a0257a48f20bdfe3dd673a5ebd5386e89fcf6944d96e871eada3c55f7ca27f964515b012c30cd29772eefd4a017a1093a8df5d188a802690797472f6226eb6dfe2606dd40b29b284dec375c3a9ea3577f08f7ca3d05044326b49a69ded000c658630a17275898981357a66e063b6bc6f7eb7400d8255614fc1c76a22c525fa0d5cfc9748ab9e8cc9a026bf2e0ff8f6207834dff05fa42402349362a9cc3e1da9ad9ca27d735b780408321e58fbed97e52c0733c8737322be76efd3314aec8973f9db7ee6d0eca1a5c5f0c87378d40d1cc16eb36ec7fb761524c9a587c99baed0e7756d85bb522df3974072b4ad04fb27c30a0ea97d7303541eb104c7b8dcfb3472d525c576073ad34f548bb2da2d4dec104ecd16ef1048fe515664f55cc251553adb11bd0219ba73f510d1ef4629ebda106bd0176e9d4d6ca698f5e6e2820ce02c33516207409541f6807a9a87e6b8af2ed6cbd5cf7fafc2e32e479c85ab04fc8de5016e0e13efb389f36c0d0e3ed4e7d1da1c2be26ad2d98578e457bd13b217971dbcc9e11fbea966c2ff744fbf42e64d72672a91b472f97652d98f67f50ef7ac911af2b1e148fadc443df7d4af77b5db43d768b93fa807909fb21b7b07b90e9905ad2c1ebd6d75d1cac8bf484f22088765bbe16406b02a7b86df200e83fe998d69dfcb918e88d4f4c8f67c7322df7c8ab3454006952438d470f5fa72a5cbb28423a4b762f26423715b66e7c7b66e398094e646c9a73cd8749d6333ff6614c75436e38618a3f38c92d1cfe72a72c9a55de0564fcde9d21ada07f2c27e511e87b44ea03d9cb7cb78a2fe4a832146f43b639fca3601fb65a8795b6d15c876c959d4a81fbee0af628d2a1e8c05f00b94a3ccf729dbdc96329d574f53e9"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) geteuid() 07:55:27 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00), 0x13f, 0xa}}, 0x20) 07:55:27 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:27 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "07511879bae02164e040131e0bdde00ba1cb136c1cce6e336b47067e0bf086cd6f064ebfd000a6a252de229bdf2a42544ded921efd2dada89ba61d3d1f6d78fdbafe04fecf523c4154bd3f4bebd6632e29e6ac485a7a25ba665cd941990e2607e8988092cf998a7205eeb5141b6507052791c34af84ef46a68fb7385105f508427c10119c716f471f16b429f6f578723667150d4da6b54ec8a6ff44950044269f0dcaffc5a289f0489d39c6847160038092cfa1deb40166b924908d46dadb2b2cf38e516008c19e612c181a3d6da0fa9942be3389832963bc53bcb4c8f8c9680fd230ccb77b3d8a6f9564af9531353d8ec1604357f136cdf637d35c388d6c0ef579b0a298b70a7701822c78d5edea32dd7eb5844cdb9cccfd380d9d20ae1d9b587bef7c6b65c5f99a9b975f0201c3db4e2fffe923e4c2111200431349da14d0ea84c8ce67a682695b902b4e243948078833515075408a57a3e0fe7b9606612e2f08f0bf59cda3d356c84482d2b3658b28d3b63712e827297e49ff324123765ec9b2eefe2a0257a48f20bdfe3dd673a5ebd5386e89fcf6944d96e871eada3c55f7ca27f964515b012c30cd29772eefd4a017a1093a8df5d188a802690797472f6226eb6dfe2606dd40b29b284dec375c3a9ea3577f08f7ca3d05044326b49a69ded000c658630a17275898981357a66e063b6bc6f7eb7400d8255614fc1c76a22c525fa0d5cfc9748ab9e8cc9a026bf2e0ff8f6207834dff05fa42402349362a9cc3e1da9ad9ca27d735b780408321e58fbed97e52c0733c8737322be76efd3314aec8973f9db7ee6d0eca1a5c5f0c87378d40d1cc16eb36ec7fb761524c9a587c99baed0e7756d85bb522df3974072b4ad04fb27c30a0ea97d7303541eb104c7b8dcfb3472d525c576073ad34f548bb2da2d4dec104ecd16ef1048fe515664f55cc251553adb11bd0219ba73f510d1ef4629ebda106bd0176e9d4d6ca698f5e6e2820ce02c33516207409541f6807a9a87e6b8af2ed6cbd5cf7fafc2e32e479c85ab04fc8de5016e0e13efb389f36c0d0e3ed4e7d1da1c2be26ad2d98578e457bd13b217971dbcc9e11fbea966c2ff744fbf42e64d72672a91b472f97652d98f67f50ef7ac911af2b1e148fadc443df7d4af77b5db43d768b93fa807909fb21b7b07b90e9905ad2c1ebd6d75d1cac8bf484f22088765bbe16406b02a7b86df200e83fe998d69dfcb918e88d4f4c8f67c7322df7c8ab3454006952438d470f5fa72a5cbb28423a4b762f26423715b66e7c7b66e398094e646c9a73cd8749d6333ff6614c75436e38618a3f38c92d1cfe72a72c9a55de0564fcde9d21ada07f2c27e511e87b44ea03d9cb7cb78a2fe4a832146f43b639fca3601fb65a8795b6d15c876c959d4a81fbee0af628d2a1e8c05f00b94a3ccf729dbdc96329d574f53e9"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) r6 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r6, &(0x7f0000000d80)='./file1\x00') 07:55:27 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) ioctl$PTP_PEROUT_REQUEST2(r6, 0x40383d0c, &(0x7f0000000cc0)={{0x9, 0x80000001}, {0xfffffffffffffeff, 0x8001}, 0xbe2, 0x1}) 07:55:27 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) geteuid() 07:55:27 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) [ 457.558207][T17980] fuse: Bad value for 'user_id' 07:55:27 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r10, &(0x7f0000000d80)={0x13, 0x10, 0xfa00, {&(0x7f0000000b00), r11}}, 0x18) 07:55:27 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) r6 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r6, &(0x7f0000000d80)='./file1\x00') 07:55:27 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000c80)={{0x1, 0x1, 0x18, r0, {0x5}}, './file1\x00'}) 07:55:27 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) 07:55:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000d40)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000d00), 0x13f, 0xa}}, 0x20) 07:55:27 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r5, 0x80503d01, &(0x7f0000000c00)) 07:55:27 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:27 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) geteuid() 07:55:27 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r5, &(0x7f0000000d80)='./file1\x00') 07:55:27 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:27 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)) 07:55:27 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "07511879bae02164e040131e0bdde00ba1cb136c1cce6e336b47067e0bf086cd6f064ebfd000a6a252de229bdf2a42544ded921efd2dada89ba61d3d1f6d78fdbafe04fecf523c4154bd3f4bebd6632e29e6ac485a7a25ba665cd941990e2607e8988092cf998a7205eeb5141b6507052791c34af84ef46a68fb7385105f508427c10119c716f471f16b429f6f578723667150d4da6b54ec8a6ff44950044269f0dcaffc5a289f0489d39c6847160038092cfa1deb40166b924908d46dadb2b2cf38e516008c19e612c181a3d6da0fa9942be3389832963bc53bcb4c8f8c9680fd230ccb77b3d8a6f9564af9531353d8ec1604357f136cdf637d35c388d6c0ef579b0a298b70a7701822c78d5edea32dd7eb5844cdb9cccfd380d9d20ae1d9b587bef7c6b65c5f99a9b975f0201c3db4e2fffe923e4c2111200431349da14d0ea84c8ce67a682695b902b4e243948078833515075408a57a3e0fe7b9606612e2f08f0bf59cda3d356c84482d2b3658b28d3b63712e827297e49ff324123765ec9b2eefe2a0257a48f20bdfe3dd673a5ebd5386e89fcf6944d96e871eada3c55f7ca27f964515b012c30cd29772eefd4a017a1093a8df5d188a802690797472f6226eb6dfe2606dd40b29b284dec375c3a9ea3577f08f7ca3d05044326b49a69ded000c658630a17275898981357a66e063b6bc6f7eb7400d8255614fc1c76a22c525fa0d5cfc9748ab9e8cc9a026bf2e0ff8f6207834dff05fa42402349362a9cc3e1da9ad9ca27d735b780408321e58fbed97e52c0733c8737322be76efd3314aec8973f9db7ee6d0eca1a5c5f0c87378d40d1cc16eb36ec7fb761524c9a587c99baed0e7756d85bb522df3974072b4ad04fb27c30a0ea97d7303541eb104c7b8dcfb3472d525c576073ad34f548bb2da2d4dec104ecd16ef1048fe515664f55cc251553adb11bd0219ba73f510d1ef4629ebda106bd0176e9d4d6ca698f5e6e2820ce02c33516207409541f6807a9a87e6b8af2ed6cbd5cf7fafc2e32e479c85ab04fc8de5016e0e13efb389f36c0d0e3ed4e7d1da1c2be26ad2d98578e457bd13b217971dbcc9e11fbea966c2ff744fbf42e64d72672a91b472f97652d98f67f50ef7ac911af2b1e148fadc443df7d4af77b5db43d768b93fa807909fb21b7b07b90e9905ad2c1ebd6d75d1cac8bf484f22088765bbe16406b02a7b86df200e83fe998d69dfcb918e88d4f4c8f67c7322df7c8ab3454006952438d470f5fa72a5cbb28423a4b762f26423715b66e7c7b66e398094e646c9a73cd8749d6333ff6614c75436e38618a3f38c92d1cfe72a72c9a55de0564fcde9d21ada07f2c27e511e87b44ea03d9cb7cb78a2fe4a832146f43b639fca3601fb65a8795b6d15c876c959d4a81fbee0af628d2a1e8c05f00b94a3ccf729dbdc96329d574f53e9"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000bc0)={{0x1, 0x1, 0x18, r4, {0x6, 0x2}}, './file1\x00'}) 07:55:27 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) geteuid() 07:55:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) 07:55:28 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) r5 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r5, &(0x7f0000000d80)='./file1\x00') 07:55:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) 07:55:28 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:28 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) bind$packet(r2, &(0x7f0000000b80)={0x11, 0x10, 0x0, 0x1, 0x2, 0x6, @random="b822e2059f24"}, 0x14) 07:55:28 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) geteuid() 07:55:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000a80)={r9, 0x80000}) 07:55:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:55:28 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:28 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) 07:55:28 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(0xffffffffffffffff, 0x7ac, &(0x7f0000000b40)={&(0x7f0000000700)={{@host, 0x5}, {@local}, 0x400, "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"}, 0x418, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r5, &(0x7f0000000d80)='./file1\x00') 07:55:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000a40)) 07:55:28 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) geteuid() 07:55:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) 07:55:28 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r5, &(0x7f0000000d80)='./file1\x00') 07:55:28 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000680), &(0x7f00000006c0)=0x4) 07:55:28 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a00), r8) 07:55:28 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) geteuid() 07:55:28 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) socket(0x2c, 0xa, 0x6) 07:55:28 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) r5 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r5, &(0x7f0000000d80)='./file1\x00') 07:55:29 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) 07:55:29 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) geteuid() 07:55:29 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 07:55:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) socket(0x2c, 0xa, 0x6) 07:55:29 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000600), 0x101000, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r5, &(0x7f0000000d80)='./file1\x00') 07:55:29 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:29 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) geteuid() 07:55:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) r7 = socket(0x2c, 0xa, 0x6) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000009c0)=@req3={0x5, 0x7f, 0x3, 0xff, 0x8001, 0x101, 0x3ff}, 0x1c) 07:55:29 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) 07:55:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) socket(0x2c, 0xa, 0x6) 07:55:29 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000580)) r5 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r5, &(0x7f0000000d80)='./file1\x00') 07:55:29 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) geteuid() 07:55:29 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) socket(0x2c, 0xa, 0x6) 07:55:29 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) bind$packet(r4, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) 07:55:29 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) socket(0x2c, 0xa, 0x6) 07:55:29 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) geteuid() 07:55:29 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') 07:55:29 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0xffff}}, './file1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000d40)='net/vlan/config\x00') symlinkat(&(0x7f0000000d00)='./file0\x00', r4, &(0x7f0000000d80)='./file1\x00') 07:55:29 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PTP_PIN_GETFUNC(r2, 0xc0603d06, &(0x7f00000004c0)={'\x00', 0x6, 0x0, 0x5355}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) 07:55:29 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r3, 0x5, "7eaa27", "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"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) socket(0x2c, 0xa, 0x6) 07:55:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0xa4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x7fffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x8, 0x3}) ioctl$PTP_EXTTS_REQUEST2(r3, 0x40103d0b, &(0x7f0000000180)={0x101, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r4, 0x5, "7eaa27", "481e41d7a5a70aee11b75ffc72caea8d8ae7de4489726d965ca9bae833d8e0c4ff3a6d5c674293291af9176c8989226c2fa8b6b7707d7308b2772ddfda8f88c7ead795e841ce17b05d7543595c07532bba1adac2ab4913eba805bf22f5271a077917ffaaa85f2b2a343e568bdce4e7f7ce52e9e713b4bc2a9d264525a464ab47bbda9da2bc64cdfa1cfba0a7ff7a19d8cd748b5a12f68c2c1a72c79ed4adfa77e0094b06c0168147c8aa67fbb313d28ceb06b9fc381cd75967a1c84e7117ce181904985e0c05df265b2ac727cb70c5efa6c720e089a9367058d88582b46c4ca7f6007e32faca48dc6b1f8002c36ad3e3c3e4e324394f81a929df3425352053a7"}}, 0x110) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000000600)={&(0x7f00000005c0)=[{0x8, 0x5201, 0x68, &(0x7f0000000380)="4a6d511f279e65001f3455d82fc0bbbd2baf38add7824152c0f95d737b5e0abcc788473a16f8d78773e005c055a1eb082aadc0820e319c34122dff63626ed4d4fac94c151a03fd3353a82c8aec815f450ac156ec53bd696115de09f14d949a8375d4c2151fee70c6"}, {0xac, 0x4000, 0xf0, &(0x7f0000000400)="aefb56c534bf20537d5e15f8ee96bafbb20f60d67033483b9c330eb04bead05e8f34ef384f48d9d6384272ff7ee8ea1c46942bd54f484fa43dddd087951826ad88c487a69b13167c30158d43e1126148d25466588c6772d4aa5570d9d2d74560aa116e7f15bac957e32e63e5198823bd6faf41a457b19a7824ae6de6b54d6e4bf7e02ecf40aae4e4852ec7b85a4c35d233c07466b589bcc2edeb786e67dcc8891bc3c2e4ff508bdd6b7800eb7998d6dfbb9a9fe1616f93364ccd58d4fa3dcb924a3d802f919d1b56deb8eb8567ea0ec3629ddb303b3d5d7530131b6abcddcb98ba943717b687355e9ecaea483ca467d1"}, {0x3, 0x2001, 0x98, &(0x7f0000000500)="11240bf7d6b5c7ed75cac50c3ce14db06ac5fa016d94eb4a87bcb4a0d5d27db1c905f947e924ef72d9c2783354b095181969d191f4b316d3f333e21afff801c3e9ba1f86e845d57cbeafa56e5c43129d8e91108e67b2955d45db7c89f6f5e5ee34d90e6391a83ecc3b4b1ebf4be9a65d79aeaacc8b1b9af0b30ef68ab08a4d126437cf212e01e70ad0fc33ef9a22991541f75e61ca0bf2c0"}], 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000640), 0xa03, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000680)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r3, 0xc05064a7, &(0x7f0000000880)={&(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[{}, {}, {}], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0], 0x3, 0x7, 0x6}) ioctl$DRM_IOCTL_MODE_GETENCODER(r5, 0xc01464a6, &(0x7f0000000900)={r6}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000940)={'\x00', 0x7, 0x1}) 07:55:30 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000040)={'\x00', 0xfffffffa, 0x2, 0x8}) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f00000000c0)={0x4, 0x7}) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000100)={'\x00', 0x2, 0x2, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000001c0)={'\x00', 0x81, 0x1, 0x51a5618c}) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, &(0x7f0000000240)) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f0000000280)={0x1, 0x2}) ioctl$PTP_CLOCK_GETCAPS(r1, 0x80503d01, &(0x7f00000002c0)) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) ioctl$PTP_PIN_GETFUNC2(r2, 0xc0603d0f, &(0x7f0000000380)={'\x00', 0x0, 0x0, 0x1}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000440)={'\x00', 0x7, 0x0, 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x1b, 0x0, 0x1, 0x5, 0x6, @local}, 0x14) [ 460.383103][T18095] ================================================================== [ 460.391239][T18095] BUG: KASAN: slab-use-after-free in __list_del_entry_valid_or_report+0x198/0x1b0 [ 460.400633][T18095] Read of size 8 at addr ffff888050299048 by task syz-executor.4/18095 [ 460.408909][T18095] [ 460.411256][T18095] CPU: 1 PID: 18095 Comm: syz-executor.4 Not tainted 6.6.0-syzkaller-14614-g77fa2fbe87fc #0 [ 460.421360][T18095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 460.431460][T18095] Call Trace: [ 460.434771][T18095] [ 460.437736][T18095] dump_stack_lvl+0xd9/0x1b0 [ 460.442431][T18095] print_report+0xc4/0x620 [ 460.446908][T18095] ? __virt_addr_valid+0x5e/0x2d0 [ 460.451974][T18095] ? __phys_addr+0xc6/0x140 [ 460.456504][T18095] kasan_report+0xda/0x110 [ 460.460954][T18095] ? __list_del_entry_valid_or_report+0x198/0x1b0 [ 460.467398][T18095] ? __list_del_entry_valid_or_report+0x198/0x1b0 [ 460.473851][T18095] __list_del_entry_valid_or_report+0x198/0x1b0 [ 460.480127][T18095] ptp_release+0xc4/0x2b0 [ 460.484552][T18095] ? ptp_open+0x4f0/0x4f0 [ 460.488899][T18095] posix_clock_release+0xa4/0x160 [ 460.493976][T18095] ? posix_clock_register+0x1e0/0x1e0 [ 460.499381][T18095] __fput+0x270/0xbb0 [ 460.503390][T18095] __fput_sync+0x47/0x50 [ 460.507656][T18095] __x64_sys_close+0x87/0xf0 [ 460.512273][T18095] do_syscall_64+0x3f/0x110 [ 460.516824][T18095] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 460.522830][T18095] RIP: 0033:0x7fcb5607b9da [ 460.527255][T18095] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 460.546879][T18095] RSP: 002b:00007ffdf7ee0d20 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 460.555310][T18095] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fcb5607b9da [ 460.563319][T18095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 460.571299][T18095] RBP: 0000000000000032 R08: 0000001b31520000 R09: 000000000000000c [ 460.579280][T18095] R10: 000000008172f89b R11: 0000000000000293 R12: 00007fcb55c01000 [ 460.587268][T18095] R13: ffffffffffffffff R14: 00007fcb55c00000 R15: 00000000000705e1 [ 460.595257][T18095] [ 460.598283][T18095] [ 460.600607][T18095] Allocated by task 18100: [ 460.605029][T18095] kasan_save_stack+0x33/0x50 [ 460.609737][T18095] kasan_set_track+0x25/0x30 [ 460.614354][T18095] __kasan_kmalloc+0xa3/0xb0 [ 460.618964][T18095] ptp_open+0xe3/0x4f0 [ 460.623047][T18095] posix_clock_open+0x17e/0x240 [ 460.627926][T18095] chrdev_open+0x26d/0x6e0 [ 460.632387][T18095] do_dentry_open+0x8d4/0x18d0 [ 460.637176][T18095] path_openat+0x1d4e/0x2c40 [ 460.641802][T18095] do_filp_open+0x1de/0x430 [ 460.646322][T18095] do_sys_openat2+0x176/0x1e0 [ 460.651025][T18095] __x64_sys_openat+0x175/0x210 [ 460.655899][T18095] do_syscall_64+0x3f/0x110 [ 460.660423][T18095] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 460.666350][T18095] [ 460.668681][T18095] Freed by task 18098: [ 460.672751][T18095] kasan_save_stack+0x33/0x50 [ 460.677459][T18095] kasan_set_track+0x25/0x30 [ 460.682095][T18095] kasan_save_free_info+0x28/0x40 [ 460.687156][T18095] ____kasan_slab_free+0x138/0x190 [ 460.692296][T18095] __kmem_cache_free+0xcc/0x3d0 [ 460.697174][T18095] ptp_release+0x204/0x2b0 [ 460.701609][T18095] posix_clock_release+0xa4/0x160 [ 460.706671][T18095] __fput+0x270/0xbb0 [ 460.710670][T18095] __fput_sync+0x47/0x50 [ 460.714932][T18095] __x64_sys_close+0x87/0xf0 [ 460.719549][T18095] do_syscall_64+0x3f/0x110 [ 460.724077][T18095] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 460.730002][T18095] [ 460.732331][T18095] The buggy address belongs to the object at ffff888050298000 [ 460.732331][T18095] which belongs to the cache kmalloc-8k of size 8192 [ 460.746398][T18095] The buggy address is located 4168 bytes inside of [ 460.746398][T18095] freed 8192-byte region [ffff888050298000, ffff88805029a000) [ 460.760384][T18095] [ 460.762716][T18095] The buggy address belongs to the physical page: [ 460.769130][T18095] page:ffffea000140a600 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x50298 [ 460.779295][T18095] head:ffffea000140a600 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 460.788240][T18095] flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 460.796230][T18095] page_type: 0x1() [ 460.799975][T18095] raw: 00fff00000000840 ffff888013040a00 ffffea0001f6bf10 ffffea0001462610 [ 460.808581][T18095] raw: 0000000000000000 ffff888050298000 0000000100000001 0000000000000000 [ 460.817173][T18095] page dumped because: kasan: bad access detected [ 460.823590][T18095] page_owner tracks the page as allocated [ 460.829410][T18095] page last allocated via order 2, migratetype Unmovable, gfp_mask 0x3420c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_COMP|__GFP_HARDWALL|__GFP_THISNODE), pid 18100, tgid 18098 (syz-executor.0), ts 460348439015, free_ts 458178143027 [ 460.851315][T18095] post_alloc_hook+0x2cf/0x340 [ 460.856109][T18095] get_page_from_freelist+0xa25/0x36c0 [ 460.861597][T18095] __alloc_pages+0x1d0/0x4a0 [ 460.866215][T18095] cache_grow_begin+0x99/0x3a0 [ 460.870996][T18095] cache_alloc_refill+0x294/0x3a0 [ 460.876036][T18095] __kmem_cache_alloc_node+0x3ba/0x460 [ 460.881513][T18095] kmalloc_trace+0x25/0xe0 [ 460.885979][T18095] ptp_open+0xe3/0x4f0 [ 460.890057][T18095] posix_clock_open+0x17e/0x240 [ 460.894937][T18095] chrdev_open+0x26d/0x6e0 [ 460.899467][T18095] do_dentry_open+0x8d4/0x18d0 [ 460.904274][T18095] path_openat+0x1d4e/0x2c40 [ 460.908892][T18095] do_filp_open+0x1de/0x430 [ 460.913421][T18095] do_sys_openat2+0x176/0x1e0 [ 460.918140][T18095] __x64_sys_openat+0x175/0x210 [ 460.923023][T18095] do_syscall_64+0x3f/0x110 [ 460.927551][T18095] page last free stack trace: [ 460.932231][T18095] free_unref_page_prepare+0x4f8/0xa90 [ 460.937721][T18095] free_unref_page+0x33/0x3b0 [ 460.942436][T18095] slabs_destroy+0x85/0xc0 [ 460.946870][T18095] ___cache_free+0x2b7/0x420 [ 460.951483][T18095] qlist_free_all+0x4c/0x1b0 [ 460.956093][T18095] kasan_quarantine_reduce+0x18e/0x1d0 [ 460.961566][T18095] __kasan_slab_alloc+0x65/0x90 [ 460.966442][T18095] kmem_cache_alloc+0x159/0x3f0 [ 460.971313][T18095] getname_flags.part.0+0x50/0x4e0 [ 460.976443][T18095] getname_flags+0x9c/0xf0 [ 460.980877][T18095] user_path_at_empty+0x2c/0x60 [ 460.985763][T18095] do_readlinkat+0xdd/0x310 [ 460.990295][T18095] __x64_sys_readlink+0x78/0xb0 [ 460.995173][T18095] do_syscall_64+0x3f/0x110 [ 460.999692][T18095] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 461.005626][T18095] [ 461.007954][T18095] Memory state around the buggy address: [ 461.013585][T18095] ffff888050298f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 461.021663][T18095] ffff888050298f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 461.029739][T18095] >ffff888050299000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 461.037812][T18095] ^ [ 461.044224][T18095] ffff888050299080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 461.052305][T18095] ffff888050299100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 461.060373][T18095] ================================================================== [ 461.068456][T18095] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 461.075653][T18095] CPU: 1 PID: 18095 Comm: syz-executor.4 Not tainted 6.6.0-syzkaller-14614-g77fa2fbe87fc #0 [ 461.085735][T18095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 461.095806][T18095] Call Trace: [ 461.099095][T18095] [ 461.102037][T18095] dump_stack_lvl+0xd9/0x1b0 [ 461.106648][T18095] panic+0x6dc/0x790 [ 461.110566][T18095] ? panic_smp_self_stop+0xa0/0xa0 [ 461.115700][T18095] ? rcu_is_watching+0x12/0xb0 [ 461.120519][T18095] ? reacquire_held_locks+0x4b0/0x4b0 [ 461.125949][T18095] ? dump_page+0x6dd/0x1310 [ 461.130486][T18095] ? check_panic_on_warn+0x1f/0xb0 [ 461.135625][T18095] check_panic_on_warn+0xab/0xb0 [ 461.140604][T18095] end_report+0x108/0x150 [ 461.144962][T18095] kasan_report+0xea/0x110 [ 461.149406][T18095] ? __list_del_entry_valid_or_report+0x198/0x1b0 [ 461.155856][T18095] ? __list_del_entry_valid_or_report+0x198/0x1b0 [ 461.162304][T18095] __list_del_entry_valid_or_report+0x198/0x1b0 [ 461.168597][T18095] ptp_release+0xc4/0x2b0 [ 461.172956][T18095] ? ptp_open+0x4f0/0x4f0 [ 461.177317][T18095] posix_clock_release+0xa4/0x160 [ 461.182373][T18095] ? posix_clock_register+0x1e0/0x1e0 [ 461.187773][T18095] __fput+0x270/0xbb0 [ 461.191776][T18095] __fput_sync+0x47/0x50 [ 461.196050][T18095] __x64_sys_close+0x87/0xf0 [ 461.200674][T18095] do_syscall_64+0x3f/0x110 [ 461.205203][T18095] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 461.211138][T18095] RIP: 0033:0x7fcb5607b9da [ 461.215565][T18095] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 461.235190][T18095] RSP: 002b:00007ffdf7ee0d20 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 461.243623][T18095] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fcb5607b9da [ 461.251601][T18095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 461.259588][T18095] RBP: 0000000000000032 R08: 0000001b31520000 R09: 000000000000000c [ 461.267571][T18095] R10: 000000008172f89b R11: 0000000000000293 R12: 00007fcb55c01000 [ 461.275546][T18095] R13: ffffffffffffffff R14: 00007fcb55c00000 R15: 00000000000705e1 [ 461.283546][T18095] [ 461.286875][T18095] Kernel Offset: disabled [ 461.291199][T18095] Rebooting in 86400 seconds..