0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x13, r0, 0x0) 13:56:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fude.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03#\xf0\x00', @ifru_mtu=0x1}) 13:56:42 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x79}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt(r0, 0x3ff, 0x3, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = getgid() mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10200, 0x0, &(0x7f0000ffb000/0x2000)=nil}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuie.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:42 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x7a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fule.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03%\xf0\x00', @ifru_mtu=0x1}) 13:56:42 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x7b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuoe.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:43 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r0, &(0x7f00000000c0)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:43 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0xffff) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="eb5735bf9d7b442ce7bcda9f8dda608fde2477a87f5594ea0d540bb49a6128807d569e0315bf326f6bb73c9a7cae4d1269581fa8889624b48e7d75d1474f6245216f7a44fe33c025c5ee26092cd9d2c285b573be9045d1f9c95b1d71306e0cfe65838b9cf5a7cdef5c269a2baa30a018824362b57f0b03bcb1ed40854231e023a267afdec238da11e8b0bd0296b416578a58340c6d67dc", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fupe.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:43 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570f949cb759a59c922d78b055f69643d9b1eb9292195adf10c458c05ac6cca817cbdef2ffba7359e50dea428974ca2cd787b31dbb470f29a4916b7974ac19f7b7355a6d3edb3", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:43 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x7c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 535.643469][T23788] fuse: Bad value for 'user_id' [ 535.724818][T23788] fuse: Bad value for 'user_id' 13:56:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x33e2, 0x80000) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000040)=0x3) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuue.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xc0\x0e', @ifru_mtu=0x1}) 13:56:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) r2 = getuid() mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000004c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_gt={'fowner>', r2}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@appraise='appraise'}, {@audit='audit'}]}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) [ 535.778707][T23898] fuse: Unknown parameter 'groupIuY"׋_id' [ 535.844677][T23898] fuse: Unknown parameter 'groupIuY"׋_id' 13:56:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x100010156) r1 = getpid() tkill(r1, 0x36) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') 13:56:43 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x7d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 536.036012][T23914] fuse: blksize only supported for fuseblk 13:56:43 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2281d201a405643d00"/18, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',@']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>', r1}}]}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuxe.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 536.309341][T23933] fuse: Unknown parameter '"d' 13:56:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f74506f64653d30303030303030300700000030303030303035303030322c710100725f69643d7883abf052dd8ae2385d9ab227fb", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x101, 0x7fff, 0x3, 0xfffffffffffffffb}, 0x8) [ 536.337276][T23934] fuse: Unknown parameter 'smackfstransmute' [ 536.345851][T23933] fuse: Unknown parameter '"d' [ 536.360771][T23938] fuse: Unknown parameter 'smackfstransmute' 13:56:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x8, 0x4000) 13:56:44 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x7e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 536.552070][T24014] fuse: Unknown parameter 'rootPode' [ 536.603933][T24014] fuse: Unknown parameter 'rootPode' 13:56:44 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x82}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") fcntl$setflags(r0, 0x2, 0x1) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fus\n.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c9ef4e8c367726f75705f691843", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000180)={0x0, {0x3, 0x2}}) 13:56:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x02', @ifru_mtu=0x1}) [ 536.886460][T24061] fuse: Unknown parameter 'group_iC00000000000000000000' [ 536.912286][T24061] fuse: Unknown parameter 'group_iC00000000000000000000' 13:56:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fus%.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fus\\.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:44 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x83}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fusw.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gqoup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/fuse\x00') stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:45 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x84}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x03', @ifru_mtu=0x1}) [ 537.585330][T24204] fuse: Unknown parameter 'gqoup_id' [ 537.632916][T24204] fuse: Unknown parameter 'gqoup_id' 13:56:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0xffff, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000280)="7959ba15189516aa35b87c79a44c1b25af1aa8858383ba0428133fd5af5b40f8c73cbed20d61e4f31550f95d31ea32abdca1534dac111c019a74dde1fb3f0d6ea1548cd1c9869021ae32c98849ea63eaaa91cc9c9672020bd2027667ff1fbf71f578e127abbb10bc530207f0d99ccb88ab473e98f90dabcec24aa902580097334c55c7656d244ab3bbaf0987bf5c849b5f4ba4b038a650398d91ad8595dc752803611acd5f553a876f846b7338c2a37ae2d0e2eb66bb7cc1a96922f338e060b67b04b3d003a24ad58f007a4d0800b60b165d23e8fc") ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000be6f70c438122f9233aad7b357c2774e86eaaa875910e32cb2885a7c774ff2cf1d6d4bc3956c965dffc9bb03971f518a7c24fa6294f81a03a5160d34153627dd3f68b61ea7f8d2e11a8891bebe4f2b3e97873f8c807000000000000004a278c5d5600f612013b30e3", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x02', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:45 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x85}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x2c79a9788e0e304e) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x03', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x04', @ifru_mtu=0x1}) 13:56:45 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x86}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 538.048038][T24327] fuse: Missing mount parameter(s) [ 538.140825][T24327] fuse: Missing mount parameter(s) 13:56:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67901eb7d636a62159", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0x7) 13:56:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x04', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x87}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x05', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') socket$bt_bnep(0x1f, 0x3, 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x88}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x05', @ifru_mtu=0x1}) 13:56:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x11, r1, 0x1, 0x8000000000000, 0x6, @broadcast}, 0x14) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)={0x0, 0xfffffffffffffff9}) ioctl$KDSETLED(r0, 0x4b32, 0x7f) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x06', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x1, [0x2]}, 0x6) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x10, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\a', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x89}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x06', @ifru_mtu=0x1}) 13:56:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x8a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\b', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x8b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\t', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6fa09476b95a88746d6f64653d30303030303030303030303030303030303034303030322c7573", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x8c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:47 executing program 1: getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='mo\x00\x00\x00\x00\x00\x00\x00\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\a', @ifru_mtu=0x1}) [ 539.828628][T24725] fuse: Unknown parameter 'roovZtmode' [ 539.905669][T24725] fuse: Unknown parameter 'roovZtmode' 13:56:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x2, 0xbf, 0x1}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4040, 0x195) 13:56:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x8d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="79b46d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\n', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x12) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) [ 540.258632][T24758] fuse: Unknown parameter 'ym0x0000000000000005' 13:56:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\v', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x8e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 540.328356][T24752] fuse: Unknown parameter 'ym0x0000000000000005' 13:56:48 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x9f691ac3e710600e, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7fffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x2, 0xb, 0x100000000, 0x100}, &(0x7f0000000200)=0x8ce, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x80000001}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000016c0)={0x6, 0x5, 0x4, 0x7e000, {}, {0x5, 0x0, 0xa4, 0x5, 0x57f, 0x81, "c97b5176"}, 0x20, 0x3, @offset=0xffffffffa107ae1d, 0x4}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000001640)='\x00', &(0x7f0000001680)='./file0\x00', r2) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000340), &(0x7f0000000380)=0x4) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) renameat2(r2, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00', 0x2) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000015a5c98154dd9820ef49a16cd37a6e095d00ab6ab87e1c14f29d1a573097c4089e734e9923586c351b07b0973b830988c884a55fdc6d658a26", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000000600)={0x0, 0xfb, 0x1015, 0x6, 0x3, "528a1e253df0fb8774806c84959c2603", "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"}, 0x1015, 0x3) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\f', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 540.648922][T24778] fuse: Missing mount parameter(s) 13:56:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x8f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\b', @ifru_mtu=0x1}) [ 540.681479][T24775] fuse: Missing mount parameter(s) 13:56:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000000c0)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fsmount(r0, 0x1, 0x88) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\r', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x90}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:48 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x0e', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:49 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x91}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\n', @ifru_mtu=0x1}) 13:56:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x0f', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:49 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x92}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x10', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x11', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB='=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) [ 541.989304][T24949] fuse: Bad value for 'user_id' [ 542.023793][T24952] fuse: Bad value for 'user_id' 13:56:49 executing program 4: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='mountinfo\x00') getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000001500)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x2, &(0x7f0000000280)=[{}, {}], &(0x7f0000000500)=""/4096}, &(0x7f0000000380)=0x78) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001600)='/dev/fuse\x00', 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e24, 0x2, @local, 0x10000}}, [0x81, 0xff, 0x2, 0x9, 0x3ff, 0x2, 0x7, 0x57, 0x0, 0x4, 0x7fffffff, 0x10001, 0x5, 0x5, 0x40]}, &(0x7f0000000200)=0x100) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000001580)={0x81}) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={r3, 0x9}, 0x8) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0xc}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="66643d72b8f366c74c9326b881ffdf6aeec976170a5901ac94da33b4a775446ae79779b737d67a585bc973946beee8a09de435f0b1b3947f035c67c92dc0cfca719ac3ecce9842f032d228e63bd9837f91d108df07f95764e597000000000000000000000000000000b7d549f8f8ff31a4ef5aed9ba090f2a81b7a74b060a0ff0c68559c2c8095fa99d49c8e2c366206a3", @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343030304790f9a1b1ced0341f73", @ANYRESDEC=0x0, @ANYBLOB="2c67726f754942141580", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x13f, 0xa}}, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000015c0)={0x200, 0x3, 0x0, 0x4, 0x20, 0x200, 0x6}, 0xc) 13:56:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0H', @ifru_mtu=0x1}) 13:56:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x12', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:49 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x93}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:56:49 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="87335ba93a6664bd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000280)='./file0\x00', 0x0) [ 542.293847][T24967] fuse: Unknown parameter '3[:fd0x0000000000000004' [ 542.369797][T24967] fuse: Unknown parameter '3[:fd0x0000000000000004' [ 542.388723][T24975] fuse: Bad value for 'fd' 13:56:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x13', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 542.420119][T24978] fuse: Bad value for 'fd' 13:56:50 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:50 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)=ANY=[@ANYRES64], 0xffffff3e) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0xffffffff, 0x7, 0x100}) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) dup2(r1, r2) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x94}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x14', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0L', @ifru_mtu=0x1}) 13:56:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x95}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x15', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x16', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x8840) r1 = epoll_create1(0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x90fd, 0x40) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f00000000c0)=[r1, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1, r1], 0x7) r3 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r3) 13:56:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x96}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x17', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0`', @ifru_mtu=0x1}) 13:56:51 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e66452862b88361dcc4baa6f80", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x2, &(0x7f0000000400)=[{&(0x7f0000000240)="691814043f2d12789ff16e379c07c1cc391d6584a6f5b596202d2308b0c00aa958bafe45029151a9ba1ca4ba7a0a63afc653934bc45db657b92ee88506dd470f33920cfaa6ddada1d05f0157be4e9dd7759226a122b4e5f1da4fb0bb429fe6004a237731e4bb58f9f0ef6c939489ee5fdac825f30390e9e2be9752652332b6e09881ef32be249c7d3d35d6118c95832d7b573c8ec2ca971ef7", 0x99}, {&(0x7f0000000300)="ce079399c4e9932dc893c188b1aea75bb113de4088ef9d39f8babceb195529843fcca0b39722324697cc1a2637bf2e4083bebcb7a6d5f4c8f31ac6eebb03a567d0faecc99da56db056eb3a3d1e60d7c7bb4bfc06910a301b9b6fd93b57e767ed3f8b0dfded4047caefe9f0775ac454e72878c6ec5bf61e0de384b3a54591eae767d7449d9346", 0x86, 0x2}], 0x4000, &(0x7f0000000440)={[{@user_xattr='user_xattr'}], [{@hash='hash'}]}) 13:56:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000000)={0x40, 0x4, 0x6, 0x7, 0x1}) 13:56:51 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x97}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:51 executing program 3: 13:56:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x18', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 543.674997][T25251] fuse: Bad value for 'rootmode' [ 543.697817][T25252] fuse: Unknown parameter 'dR+6Ko0x0000000000000004' [ 543.736313][T25251] fuse: Bad value for 'rootmode' 13:56:51 executing program 3: [ 543.816289][T25252] fuse: Unknown parameter 'dR+6Ko0x0000000000000004' 13:56:51 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fe\t', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c8509c62969726f6f746d6f64653d3030303034303030322c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000340)=0xc) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000380)=@v3={0x3000000, [{0xfffffffffffffff9, 0x200}, {0x1000, 0x7}], r2}, 0x18, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000180)=0x4) 13:56:51 executing program 3: 13:56:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x19', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 544.002962][T25269] fuse: Unknown parameter 'fe 0x0000000000000004' [ 544.064299][T25269] fuse: Unknown parameter 'fe 0x0000000000000004' 13:56:51 executing program 3: 13:56:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0h', @ifru_mtu=0x1}) 13:56:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x98}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:52 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x40) timer_delete(0x0) 13:56:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r2, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x24000000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$sndseq(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x8, 0x9, @tick=0x3, {0x7, 0x9}, {0xffffffffffffff81}, @raw32={[0x400, 0x2800000000000000]}}, {0x3, 0x9, 0x20, 0x0, @tick=0x9, {0x1f, 0xb64}, {0x0, 0xfff}, @addr={0x469e, 0x3}}, {0xba68, 0x6, 0x2, 0x6, @time={0x0, 0x989680}, {}, {0xffffffff, 0x3}, @result={0x4, 0x9}}, {0x100000001, 0x20, 0xbde4, 0x690, @tick=0x7, {0x0, 0x100000001}, {0xfffffffffffff454, 0x9}, @quote={{0xf3, 0xbbf5}, 0x7}}, {0x100000001, 0xe72e000000000000, 0x1, 0x3f, @time={0x0, 0x989680}, {0x8, 0x85f9}, {0x200, 0x20}, @raw8={"ab68cc578e854b512ab4b082"}}, {0x0, 0x3, 0x5, 0x70, @tick=0x1, {0x0, 0xffffffff}, {0x6, 0x1000}, @connect={{0x4e9, 0xba7}, {0x97, 0xd4}}}], 0x120) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x1a', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:52 executing program 3: 13:56:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x99}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:52 executing program 3: 13:56:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x1b', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:52 executing program 3: r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x0, 0x3f000002}) close(0xffffffffffffffff) 13:56:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x1c', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x9a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0l', @ifru_mtu=0x1}) 13:56:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x4, 0x2, @thr={&(0x7f0000000240), &(0x7f0000000080)="03d43b0cde66c5bba7c6c7938841c1fdd2a10558282656"}}, &(0x7f0000000100)=0x0) timer_settime(r3, 0x1, 0x0, &(0x7f0000000180)) r4 = dup3(r0, r1, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$BLKBSZSET(r4, 0x40041271, &(0x7f00000001c0)=0x9f) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) 13:56:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x8000, 0x1003, 0x1}) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x80) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:53 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="cd0040611cb7"]) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x1d', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x9b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x283, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000010000108000000bb0000005c0e000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) 13:56:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\x1e', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 545.570797][T25555] fuse: Bad value for 'group_id' [ 545.611502][T25555] fuse: Bad value for 'group_id' 13:56:53 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffff43, 0x0) 13:56:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse!', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 545.701464][T25561] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:56:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x9c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 545.810910][T25602] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:56:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:56:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x283, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000010000108000000bb0000005c0e000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) 13:56:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0t', @ifru_mtu=0x1}) [ 546.209619][T25687] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:56:54 executing program 1: r0 = getpgrp(0x0) syz_open_procfs(r0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="8b74cd00093b2dbb4121e2e3963fee76a57b51761924277c9887829c350a4c8833a7f13cb18f8ad25767026c19f3caeb7be8e92fd8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:56:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\"', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:54 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x9d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0z', @ifru_mtu=0x1}) 13:56:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x283, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000010000108000000bb0000000800000000", @ANYRES32=0x0, @ANYBLOB="00f0ffff0000000008001b0000000000"], 0x28}}, 0x0) [ 546.470457][T25805] fuse: Bad value for 'user_id' 13:56:54 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x9e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:56:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse#', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 546.515402][T25810] fuse: Bad value for 'user_id' 13:56:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x800, {0x6, 0x1447, 0x100000000, 0x7, 0x1}}) 13:56:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse$', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0x1ff, 0xa4, 0x1ff, 0x560]}, 0xc) socket$tipc(0x1e, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0xffffffffffffff00, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 13:56:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse%', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse&', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\'', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse(', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:56:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYBLOB="cb9f7c38e3a031a1ddcedd0400", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='\x00') r2 = semget(0x2, 0x0, 0x100) r3 = getuid() getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000480)={0x0, 0x10, &(0x7f0000000440)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000500)={r4, @in={{0x2, 0x4e22, @broadcast}}, [0x6, 0x80, 0x7, 0x4, 0x4, 0x8000, 0x4889, 0x42, 0x4, 0x9, 0x2, 0x7, 0x7fff, 0x1, 0x9]}, &(0x7f0000000600)=0x100) r5 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000002c0)=0xc) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000003c0)={{0x7fffffff, r3, r5, r6, r7, 0x1a, 0x4}, 0x2, 0x7f, 0x8}) stat(&(0x7f0000000280)='./file0\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rfkill\x00', 0x2, 0x0) [ 547.734312][T25861] fuse: Unknown parameter '0x00000000000000050000000000000000000000300000000000000000000˟|81' [ 547.798598][T25863] fuse: Unknown parameter '0x00000000000000050000000000000000000000300000000000000000000˟|81' [ 549.903992][T25811] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.911961][T25811] bridge0: port 1(bridge_slave_0) entered disabled state 13:57:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse)', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:01 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x9f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000480)='fuse.', 0x0, &(0x7f0000000280)=ANY=[@ANYRES64=r0, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYRES64=r1, @ANYRESHEX=r0, @ANYRESHEX=r1, @ANYRESDEC=0x0], @ANYRES32=0x0, @ANYRESOCT=r0, @ANYRES64=r0]) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:01 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 13:57:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x283, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000010000108000000bb0000092c00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) 13:57:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse*', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse+', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000000c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000680)={0x90, 0x0, 0x3, {0x3, 0x2, 0x20, 0x8, 0x1, 0x7, {0x4, 0x1f, 0x4, 0x0, 0x3e, 0x1, 0x2, 0x7, 0xff, 0x6, 0xa0, r1, r2, 0x3, 0x9}}}, 0x90) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0595"]) pread64(r0, &(0x7f0000000340)=""/117, 0x75, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000880)={0x1f3, 0x8000, 0x2, 0x4, 0x0}, &(0x7f00000008c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000780)={r5, 0x1}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000740)={r6, 0x1000000000007, 0xfc}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000400)={0x7, 0x8205, 0x6, 0x0, r7}, &(0x7f0000000440)=0x10) move_mount(r0, &(0x7f0000000800)='./file0\x00', r4, &(0x7f0000000840)='./file0\x00', 0x1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000900)={0x8dd8, {0xe6a8, 0x7, 0x1, 0x8, 0x3, 0x8001}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 554.466350][T25906] fuse: Unknown parameter '0x0000000000000004' [ 554.524647][T25906] fuse: Unknown parameter '0x0000000000000004' 13:57:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse,', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:02 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa0}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x1a', @ifru_mtu=0x1}) 13:57:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x80, 0x1000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f00000000c0)={[0x1000, 0x0, 0x4, 0x10000], 0xfff, 0x80, 0x80000001}) 13:57:02 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0xffffffffffffffb7, 0x6) 13:57:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>', r1}}]}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse-', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:02 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse/', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000200)) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_PIT(r4, 0x8048ae66, &(0x7f0000000240)={[{0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:02 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa2}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 555.186779][T25935] fuse: Unknown parameter 'smackfstransmute' 13:57:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>', r1}}]}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse<', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 555.488677][T25959] fuse: Unknown parameter 'smackfstransmute' 13:57:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>', r1}}]}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x1c', @ifru_mtu=0x1}) [ 555.726210][T26018] fuse: Unknown parameter 'smackfstransmute' 13:57:03 executing program 1: r0 = getpgid(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000040)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d1f20154334c8770b668f3ba5778e0d9af1852920348672db89b817b7aee5d831750fa603b6400386356401832cd86d898da7074bc86a3c2a8cc6ec73759f1361865aa28ee14556a17b46a1b0cd16663baf1e4c15e50e23dbe307769764bdca10feafd4a56f22f202ff564f8b5d3552e11436a2695ef5490c0475868c43d4b6f48829abc6c6f2cd95dc3551ba65df41f91a09c2472f09972177a177da80acf30a3f622daaf510104bac9bdefc56dd8b", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3ddfffffffffffffff00", @ANYRESDEC=0x0, @ANYBLOB="92b99023adad4ddbe10fa0428f21d1b7c35a2b3de75a9d0149d2468905716b3e97e81b5f0170d6afc4e75bb507a2fbd0c783cfe2fa5d64b53b763338ec602887b2b48bbcd3677c4d81bb1dee2d5941db440b4fa75cfba82df4605aba195e4df6941561262d67d1a38834476fba731faa918f2fb8cb1e84fc5b6dcee7e62c497cc0e7bce60589a784"]) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:03 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa3}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse\\', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>', r1}}]}}) [ 555.991282][T26081] fuse: Unknown parameter 'smackfstransmute' 13:57:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L-', 0x100000000}, 0x28, 0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240), &(0x7f00000002c0)=0x8) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[]) stat(&(0x7f0000000280)='./file0\x00', 0x0) [ 556.197838][T26093] fuse: Unknown parameter 'smackfstransmute' [ 556.260372][T26095] fuse: Missing mount parameter(s) [ 556.335072][T26098] fuse: Missing mount parameter(s) 13:57:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000340)=0x800) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="66643d150865c27b60ac1086f7d2f08d3cfc5eff4a692aa026a93631e84eddeda56f3a1a3ccb0c550515f3bfac5b7d02705a6474d06dcf4a3f48f39ea474556b4055eea852dd11ca54b6b187f7892b2dac5a67d222e8cebd65b6490c286b0881fffc4c28d3d77c865e2a389fb420b3342465f07f4ed49738f3fa167b93f465d965b4400ea0803e98dabafb0c2472484ce04981ea7f3a7a39fed06943a81ed914ea749be24ceb44722326fdc2c02d1d0b21c6a2cee2dbaf29bed728bf", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',y']) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000400)={0x2, 0x0, {0x3, 0x1, 0xc60, 0x0, 0x3}}) timer_create(0x1, &(0x7f0000000180)={0x0, 0x9, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) write$P9_RREADDIR(r0, &(0x7f00000005c0)={0x87, 0x29, 0x1, {0xe58, [{{0x0, 0x3, 0x6}, 0x3, 0x0, 0x7, './file0'}, {{0x1, 0x4, 0x6}, 0x695a, 0x7, 0x7, './file0'}, {{0x50, 0x0, 0x4}, 0x7, 0x101, 0x7, './file0'}, {{0x5, 0x3, 0x7}, 0x0, 0x3, 0x7, './file0'}]}}, 0x87) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) timer_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}}, &(0x7f0000000280)) 13:57:04 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa4}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x9, 0x1b, 0x7, 0xc3, "02fca4e6721a32dfead61babc05aa7fa4b5d8d096b867c4d2d2fdaca6021b4c2"}) stat(&(0x7f0000000280)='./file0\x00', 0x0) [ 556.563782][T26112] fuse: Bad value for 'fd' [ 556.573637][T26111] fuse: Invalid rootmode 13:57:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0M', @ifru_mtu=0x1}) 13:57:04 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa5}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) [ 556.694560][T26120] fuse: Bad value for 'fd' 13:57:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 556.755045][T26126] fuse: Bad value for 'fd' [ 556.770485][T26128] fuse: Bad value for 'fd' 13:57:04 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="03002e96", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={r0, @in={{0x2, 0x4e22, @local}}, 0x4, 0x5, 0x5401, 0x20004000, 0x3}, &(0x7f0000000400)=0x98) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67ab0791a6d9f0d24379d7ba588c00005f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000200), &(0x7f0000000240)=0x40) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x50, 0x80000) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000440)=0x100) 13:57:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) [ 556.876875][T26134] fuse: Invalid rootmode 13:57:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 556.970700][T26138] fuse: Unknown parameter 'gCy׺X' [ 556.991230][T26141] fuse: Bad value for 'fd' [ 557.006541][T26138] fuse: Unknown parameter 'gCy׺X' 13:57:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034343030322c757365723d46b216cc6ba6a3c6565f69643ddc339992ab6a96387b242785e200afe19299a4bc35ce1b5a69758b575ca50465c6761326d9725c8e6a0de1894b021b7eaf52bcca4dda01627a5b930fbc5936d8eed9a8c1cb24ed4fe75d8814bf513d37c5ade4c79a5a6ada753b5846117cc333e75be0ada8eabb73233d617cea4b13f8403bb99508b69c5db11f463ed73023", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:getty_exec_t:s0\x00', 0x22) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0)=0x4, 0x4) [ 557.109630][T26146] fuse: Invalid rootmode 13:57:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x5, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:04 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa6}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 557.240176][T26151] fuse: Unknown parameter 'user' [ 557.316613][T26151] fuse: Unknown parameter 'user' [ 557.352653][T26159] fuse: Invalid rootmode 13:57:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d8e93515c403a66296fe7e496510f8c716f64653d30303030303030303030303030303030", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0e9a602ce285a6af5c608d5b1fe7af6a21c38997967aeebfa20fbaceaeaf9a8fda8750491a13952ea339da79a2638f76d528b85939a94821fd09f4de6faaf2c385a96201115676486ffd662e4f428a530821e1c2fe85bb6a7b9656000a8c16b5a6e85f0046d05adafa43dea6b0c9e8419c90f8b5b13dce0286903e955d3972ebd7c22c9d35707e44dec75e89e201558be701086c3db40ce9463697999b6f72e553aa7a2d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x0, 0x100000001}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e22, @rand_addr=0x2}}, 0x1ff, 0x7fff}, 0x90) ioctl$TIOCCBRK(r1, 0x5428) stat(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[@sack_perm, @sack_perm, @mss={0x2, 0x2f0000000000000}], 0x3) [ 557.540780][T26170] fuse: Unknown parameter 'rootmQ\@:f)oQqode' [ 557.558466][T26170] fuse: Unknown parameter 'rootmQ\@:f)oQqode' 13:57:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xf4d5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x8, 0x1, 0x81, 0xfffffffffffffffc, r2}, &(0x7f0000000200)=0x10) fspick(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0xd0aee4e758c50262) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x16c) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="666476c79c6697", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000280)='./file0\x00', 0x0) sendmsg$xdp(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)="ea0b5d5286f977a9f537016335420c177ab55a4eb300c43ea87c5a2a32ce35887117e9a6b7131495a4f1f62297a287dd3ce1dcaf3a38c2db11f95b54610e56e0f976bcc0e25f7d599d8f0c9691d307c53d8163df40089a78471ff4495a686b8e2e7ef99463726c445087f50a8cc448", 0x6f}, {&(0x7f0000000340)="2519ac92f3c6496de1ccd767a67e21330a201d1ea258d4c71b6c9cdde22f664411e4bec7ad76d2c22e0660bda36cdfa43c7d9f7564dc2441bb3d3c3fa1868adde3442b855042730c17910257aa1817c0ef3c2dd376191f2afa5aebcbd62e9414710e66cf3651640f", 0x68}, {&(0x7f0000000400)="5e5a42a81d41fe7d552f6342da0716d4a3aba17b018df1cb", 0x18}, {&(0x7f0000000440)="0268cf7b2b37806a44cda8c78fb7e5b749b13ba490305b1579cae96645501c50dc1a550caf016d4ddd9cf00e00a01d1f3e1ed51c1b403656b75c3143fe3b21aef5d1d47cc947ffe76a9701c45fa45a8564a890d64321b0", 0x57}, {&(0x7f00000004c0)="256c5b723a05a9e6aa1f2cbf77419fb623c66eb7dec231a0599d917c6574830deda48626f816a651985c656218e52ae14ff4c7e4e3881dc0b550c93e95f5c1ab871342fee0a1de8f329602f2ddecbb7dfab7cd1ec8f4472d9c294a3e645436c8e6d90d982b1519f24441ce7ad4fec0fcc8bb07572385b2f251f65860e08d1a6d4cd63e3640b4cd2c1441908364719d07fac5b9e0fd120d503de398ae2253bfcb14bc16fcec67b3f99bf8892b53be259e78518e49e263dbc4d29892f3f3011e1ad10d56c340bea217", 0xc8}, {&(0x7f00000005c0)}], 0x6, 0x0, 0x0, 0x40004}, 0x4000814) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/52, 0x34) 13:57:05 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa7}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 557.762313][T26181] fuse: Unknown parameter 'fdvǜf0x0000000000000004' [ 557.775998][T26182] fuse: Invalid rootmode 13:57:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 557.837984][T26181] fuse: Unknown parameter 'fdvǜf0x0000000000000004' 13:57:05 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa8}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@empty, @remote, @broadcast}, 0xc) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) [ 557.973994][T26199] fuse: Invalid rootmode 13:57:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 558.219051][T26214] fuse: Invalid rootmode 13:57:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x268, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x69c9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18}]}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x99c1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7b8b800000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4000}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x667}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0xf8, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffc0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x84b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x309}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffffffff}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x40}, 0x40000) 13:57:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x9, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:06 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xa9}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 558.661276][T26227] fuse: Invalid rootmode 13:57:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xa, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:06 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xaa}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:06 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:06 executing program 1: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/253, 0xfd}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000000400)=""/233, 0xe9}, {&(0x7f0000000000)=""/92, 0x5c}, {&(0x7f0000000200)=""/124, 0x7c}, {&(0x7f0000000500)=""/247, 0xf7}, {&(0x7f0000000600)=""/155, 0x9b}], 0x7, &(0x7f0000001c40)=[{&(0x7f00000006c0)=""/101, 0x65}, {&(0x7f0000000740)=""/47, 0x2f}, {&(0x7f0000000780)=""/74, 0x4a}, {&(0x7f0000000800)=""/56, 0x38}, {&(0x7f0000000840)=""/246, 0xf6}, {&(0x7f0000000940)=""/215, 0xd7}, {&(0x7f0000000a40)=""/245, 0xf5}, {&(0x7f0000000b40)=""/140, 0x8c}], 0x8, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$inet6_dccp_int(r1, 0x21, 0x11, &(0x7f0000001cc0)=0x3ff, 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) recvfrom$x25(r1, &(0x7f0000001d00)=""/23, 0x17, 0x10000, 0x0, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) getpgrp(r0) [ 558.913961][T26242] fuse: Invalid rootmode 13:57:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x10, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:06 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 559.198091][T26256] fuse: Invalid rootmode 13:57:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gYup_ix\t\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) 13:57:07 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x48, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:07 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xab}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 559.546583][T26269] fuse: Invalid rootmode 13:57:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4c, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:07 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xac}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 559.614678][T26362] fuse: Unknown parameter 'gYup_ix ' 13:57:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 559.676131][T26378] fuse: Unknown parameter 'gYup_ix ' [ 559.850740][T26389] fuse: Invalid rootmode 13:57:07 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x1, 0xfffffffffffffffd, {"02f8fc48b4317bd910a96e36d7372bb2"}, 0x5, 0x6c487e57, 0xa7c}}}, 0x90) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6664513afa3d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f303030957086723030303030303034303030322c757365725f69643d00"/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "c340a8666dadb0846d020dc3a37fd3ea"}, 0x11, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x9, @ipv4={[], [], @rand_addr=0x81}, 0x7}}, 0x1, 0x5}, &(0x7f0000000340)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={r2, 0x8}, &(0x7f0000000400)=0x8) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x60, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 559.990350][T26398] fuse: Unknown parameter 'fdQ:' 13:57:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) [ 560.041573][T26398] fuse: Unknown parameter 'fdQ:' 13:57:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='.\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x68, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:07 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xad}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 560.314580][T26418] fuse: Bad value for 'fd' 13:57:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000100)='trusted.overlay.origin\x00'}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) syz_open_procfs(r0, &(0x7f0000000200)='net/softnet_stat\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) [ 560.545281][T26433] fuse: Bad value for 'fd' 13:57:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6c, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x89', @ifru_mtu=0x1}) 13:57:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x7) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', 0x0, 0xb4, 0x0) 13:57:08 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xae}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x100) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=0000000000000000040002,user_id=\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="926a3699b130240291c73b90ef050000000000000008c46596a50c1a2016fd52c40a665a5e5ffc8223f84a91b7f9e1cf86b48de6080578e45234a415a8e6cca31dbc33bcb0b2e1d94ab16edc1a3d77fdd4aaecc8caf12e8710249d124f5838"]) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x74, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 560.904234][T26455] fuse: Bad value for 'fd' [ 560.983837][T26459] fuse: Bad value for 'user_id' 13:57:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7a, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:08 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xaf}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000200)={0x1, 0x0, 'client0\x00', 0xffffffff80000000, "0bd367e68e0fa40f", "e90ebbce506e37907c0ba78ecec1e44e12e6c7b3430521310905e6e34bc62488", 0x3, 0x100}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 561.031611][T26563] fuse: Bad value for 'user_id' 13:57:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x03', @ifru_mtu=0x1}) 13:57:08 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x300, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:09 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb0}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 561.441137][T26589] fuse: Invalid rootmode 13:57:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:09 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x500, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 561.627600][T26602] fuse: Invalid rootmode 13:57:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:09 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x600, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:09 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x03', @ifru_mtu=0x1}) [ 561.864464][T26689] fuse: Invalid rootmode 13:57:09 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x413, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x3, @sliced={0x0, [0x7, 0x7, 0xe6d, 0x8000, 0xec24, 0x3, 0x3, 0x7f, 0x2, 0x8, 0x5cd9, 0xfffffffffffffffe, 0x3800, 0x3, 0x7, 0x8, 0x8fda, 0x9, 0x1, 0x6d54a8d7, 0x5, 0xfad, 0xc5, 0x8, 0x23, 0x1, 0xffff, 0x1000, 0x3, 0x5, 0x5, 0x101, 0x9, 0xffffffff, 0x3, 0x5, 0x7, 0x1ff, 0x9, 0x7, 0x8001, 0x6, 0x5, 0x0, 0xcc1, 0x9, 0x3, 0x8], 0x9}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x4, 0x1f, 0x7f, 0x1, 0x800}, &(0x7f0000000500)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000600)={r1, 0x94, &(0x7f0000000540)=[@in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e20, 0xffffffffffff4172, @mcast2, 0x4}, @in6={0xa, 0x4e20, 0xffffffff, @mcast1, 0x7}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e22, 0xcb5, @ipv4={[], [], @rand_addr=0x2}, 0x7fff}]}, &(0x7f0000000640)=0x10) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000180)={0x5, 0x200, 0x1}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=cs2', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c7cdf2cb4c0b6000000000000000000f489fbbb74e60723369e49bc10ababa3ddec62886d5d4ed7c004a32b29b9324db277430213b0abfa4cfd19fdca30878d3674ab815917e76b3c91bbc06ca412eee25f01621c5defc77f10d25c3aed367dad8f24dcc65cd0b5abe98555d407ea78d16e50c08146935225e03c5b4c27c33ed8"]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x220, 0x0) 13:57:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:10 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x700, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:10 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb2}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000200)={0x6, 0x2, 0x4, 0x20, {0x77359400}, {0x5, 0xc, 0x5, 0x0, 0x3, 0x8, "4adafd54"}, 0x2, 0x1, @planes=&(0x7f00000000c0)={0x1, 0x6, @mem_offset=0x6, 0x6}, 0x4}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@random={'system.', '%ppp1-\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 562.399485][T26739] fuse: Invalid rootmode 13:57:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 13:57:10 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb3}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x900, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 562.642071][T26848] fuse: Missing mount parameter(s) 13:57:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 562.687783][T26855] fuse: Invalid rootmode 13:57:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xa00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:10 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb4}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 562.820589][T26861] fuse: Missing mount parameter(s) [ 562.925180][T26871] fuse: Invalid rootmode 13:57:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x4}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 13:57:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x1020, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:10 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb5}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 563.360799][T26988] fuse: Missing mount parameter(s) 13:57:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2010, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 563.596799][T27003] fuse: Bad value for 'fd' 13:57:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:11 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb6}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3f00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 563.806800][T27075] fuse: Bad value for 'fd' 13:57:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x9, 0x1b, 0x7, 0xc3, "02fca4e6721a32dfead61babc05aa7fa4b5d8d096b867c4d2d2fdaca6021b4c2"}) stat(&(0x7f0000000280)='./file0\x00', 0x0) 13:57:11 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:11 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb7}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 564.319060][T27134] fuse: Bad value for 'fd' [ 564.359951][T27131] fuse: Invalid rootmode 13:57:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4800, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4c00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 564.575731][T27148] fuse: Invalid rootmode [ 564.589341][T27149] fuse: Invalid rootmode 13:57:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:12 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb8}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 564.696800][T27204] fuse: Invalid rootmode 13:57:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 564.815958][T27259] fuse: Invalid rootmode 13:57:12 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:12 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xb9}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x7}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6800, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:12 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='m\b\x03\x00\x00\x00\x00\x00\x00\xfc\xe0\xe3\x0e\xa0\xd7\a') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x100, 0x0) 13:57:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4b0177f29a06bd6f488d3d00171af8678b10ae6018aed4415bdd9ca32a8d3402a17945367797176b2c904ef0499af7514346311d7d11892385aa47919027c1f7cdfc3fb1ac9d269eec296ea3e92cb1c147a1ad79201528c49ffab8e1494dbe898b626caad6a731041404b306f82203861b20be7d31c313fc388c48893a7c458d965cba7dd216af9a436b46846a26fda71b36212cfedbaa233931746c339812e9"]) r2 = getuid() getgroups(0x5, &(0x7f0000000200)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0]) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000700)={0x9, 0x2, {0x3, 0x2, 0x2, 0x1, 0x5}}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, r6, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", "", "", ""]}, 0x24}}, 0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x1010400, &(0x7f0000000540)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@appraise='appraise'}, {@context={'context', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@audit='audit'}, {@euid_lt={'euid<', r4}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@smackfshat={'smackfshat', 0x3d, 'mountinfo\x00'}}]}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000000c0)={0xffffffffffffff7f, 0x2}, 0x2) [ 565.361409][T27281] fuse: Invalid rootmode 13:57:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6c00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:13 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xba}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 565.599653][T27296] fuse: Bad value for 'group_id' [ 565.640019][T27297] fuse: Unknown parameter 'smackfstransmute' [ 565.649067][T27296] fuse: Bad value for 'subtype' [ 565.673920][T27296] fuse: Bad value for 'group_id' 13:57:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) [ 565.704685][T27296] fuse: Bad value for 'subtype' [ 565.893779][T27410] fuse: Unknown parameter 'smackfstransmute' 13:57:13 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:13 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xbb}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x03', @ifru_mtu=0x1}) 13:57:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)='!cgroupwlan1\'$vmnet0\x00', 0x15, 0x3) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7a00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xedc0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 566.283742][T27426] fuse: Unknown parameter 'smackfstransmute' 13:57:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:14 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xbc}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 566.484202][T27443] fuse: Unknown parameter 'smackfstransmute' 13:57:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xff00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:14 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xbd}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 566.680243][T27453] fuse: Unknown parameter 'smackfstransmute' 13:57:14 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x100000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:14 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xbe}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:14 executing program 4: mount$bpf(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='bpf\x00', 0x20000, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0xfffffffffffeffff}}, {@mode={'mode', 0x3d, 0x800}}, {@mode={'mode', 0x3d, 0xffff}}], [{@measure='measure'}]}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 567.192065][T27474] fuse: Unknown parameter 'smackfstransmute' 13:57:14 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xbf}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) 13:57:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x200000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 567.374490][T27484] fuse: Unknown parameter 'smackfstransmute' 13:57:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}, {@fowner_gt={'fowner>'}}]}}) [ 567.498983][T27490] fuse: Invalid rootmode 13:57:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x400000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:15 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc0}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 567.546626][T27496] fuse: Unknown parameter 'smackfstransmute' [ 567.658780][T27550] fuse: Invalid rootmode 13:57:15 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}, {@hash='hash'}]}}) 13:57:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x800000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:15 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') clock_gettime(0x0, &(0x7f0000001b40)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000001b80)={0x8, 0x3, 0x4, 0x410, {r1, r2/1000+10000}, {0x3, 0x8, 0x5, 0xc7, 0x0, 0xd0, "74cc0302"}, 0x4, 0x2, @fd=r0, 0x4}) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000000c0)={0x80, 0x9, 0x0, 0x37e}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_mount_image$ext4(&(0x7f0000001a00)='ext3\x00', &(0x7f0000001a40)='./file0\x00', 0x903, 0x1, &(0x7f0000001ac0)=[{&(0x7f0000001a80)="c2b77b2898a195f12dce16eb254884f1a6ba6e47", 0x14, 0x8000}], 0x2000, &(0x7f0000001b00)={[{@nojournal_checksum='nojournal_checksum'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_user={'obj_user'}}, {@permit_directio='permit_directio'}]}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) fstat(r3, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x9, &(0x7f00000016c0)=[{&(0x7f0000000200)="a71d8a785f258a79b6195a40ccacc19218589267321ee9e380046c177b222a58ba314148f09875a2e25b3185331994da127bade5bb40957541decac8a3322bc9671c39d176b36d8f2ce3ca0607b51d8ca7455d9e3e46c4387218c97a28622f509e40376383aa2dbc0f13431ebe46f7188f5c121985bba67f035c221e865eed870c8d3da19f4f6acaec", 0x89, 0x7fff}, {&(0x7f0000000340)="3ad111af2c5728c4e02452d29293b3000e9fb2e37c5066cc485dac4281af0d4da90b76849fd908f00dfb4e105d96c6a73faa1a4b9c5f93442b5d71d5078e63fecb210f61a5f773b16ccaa93691fc6ae816e4ada1640f4d2838b962199f", 0x5d, 0x80000000}, {&(0x7f0000000400)="03717c55bd7b7ca73b7b5a97a28e6fcefb30b9de5d36542774a7a2d133fc650c6dd85acc864d9603003854f3712e", 0x2e, 0x81}, {&(0x7f0000000440)="4115b223acb98faae3a3176aa61559e966a2178d0e37b2cf5c595ed8e91c8cd8013e406a054af890dd0d8e5f23c4f356828308ba0c409589c88e6f9b8519706e0079385b8e7e47efe5c407115a101e133c4edeffe8836bad9400300802060895ec44cc7acd898434bd05cb728058e15444d8fc74e3a921b2a137763b820d01c258aa", 0x82, 0x40}, {&(0x7f0000000500)="cc04c9626533ec7fa15f9ef1d4f5030572e5cdb65e6da2a33392dd57ee3fe720508b773b15e7f61d60e00afb44e56c7206974006c764", 0x36, 0x32}, {&(0x7f0000000540)="12c291e4a8e914591aff88948bc2d5e7e636159787406a6291a359711d21034e3bfc1ed7", 0x24, 0x550}, {&(0x7f0000000580)="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", 0x1000, 0x18}, {&(0x7f0000001580)="2677989df5405e16536b4f7819d16cc84f473c4f951a80554d901e6a7fd16611d9e7e8a553a34344e849c24b9b5345620c553a6bfd943796032878e98a2fde98b6361e4c75e440d250bf887794010002954b0c4155fb4f34ca57da5b4f722a11bddcbe3d827f2bded17809a0c052bd8b808c6052dfdfdb1c967a1546be71f47f9a7ff1a306d9b3ade5c1c190a087d5e25156b00ca4467a7cc43bc67b6821cc7341f0eb6b20a45ee88cdab9ea8acd76bdfaeb541b3f2e483c75e18c6a796f425c46d5f39c91d45e280d211427d10229cb07ec23eb3b5a2794134b5e957519b25d9f29cecc0508b73bb0dddb38056289e2870a2ebba94f", 0xf6}, {&(0x7f0000001680)="b89c7c2bb012807c0afee1a19c4d0039ef169f637f11e129113c1d3b04e3b7be49dc0706ee4c0d51", 0x28, 0x7}], 0x0, &(0x7f0000001900)={[{@umask={'umask', 0x3d, 0x9}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@case_sensitive_no='case_sensitive=no'}, {@disable_sparse_yes='disable_sparse=yes'}, {@nls={'nls', 0x3d, 'cp855'}}, {@errors_remount='errors=remount-ro'}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_yes='disable_sparse=yes'}], [{@uid_lt={'uid<', r4}}, {@euid_lt={'euid<', r5}}]}) [ 568.124382][T27620] fuse: Invalid rootmode [ 568.138418][T27621] fuse: Unknown parameter 'smackfstransmute' 13:57:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x1000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}, {@obj_type={'obj_type', 0x3d, 'proc-selinux'}}]}}) [ 568.354850][T27635] fuse: Invalid rootmode 13:57:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 568.397282][T27637] fuse: Unknown parameter 'smackfstransmute' 13:57:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fowner_eq={'fowner'}}]}}) [ 568.510028][T27641] fuse: Invalid rootmode 13:57:16 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc2}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 568.595004][T27645] fuse: Unknown parameter 'smackfstransmute' [ 568.720338][T27651] fuse: Invalid rootmode 13:57:16 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}]}}) 13:57:16 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc3}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f00000000c0)={0x2, 0x0, [{0x6, 0x100, 0x4, 0x2, 0x6}, {0x40000001, 0x61dc, 0x2, 0xffffffff, 0xfffffffffffffffc}]}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66643d8ee26d4f23c607d51b28d4aeb964432a8a8e47cfaa41d69228e433b74591c20ab0cd542d29b264fb6efa24491e57dd828b362960904e7f8e90e719756b26ba94d40b44659ab7f604d283105c91ab1b1d21db58030de8df1cb04c0e7efd3bb1a20abc2b87b94328f94bd602e53f76d3a3d95e3b857ab1b17d99753a5a71fa2c567fb00a", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grgup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000180)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000200)=r2) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0xff}) [ 569.087734][T27666] fuse: Invalid rootmode [ 569.093500][T27667] fuse: Unknown parameter 'smackfstransmute' 13:57:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x5000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 569.232258][T27676] fuse: Bad value for 'fd' 13:57:16 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 569.274334][T27678] fuse: Bad value for 'fd' 13:57:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) 13:57:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 569.430495][T27687] fuse: Invalid rootmode 13:57:17 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc4}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:17 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:17 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 569.723631][T27802] fuse: Invalid rootmode 13:57:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 569.769265][T27802] fuse: Invalid rootmode 13:57:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:17 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:17 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc5}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:17 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:17 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc6}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 570.079089][T27902] fuse: Bad value for 'fd' [ 570.085855][T27834] fuse: Invalid rootmode 13:57:17 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 570.249094][T27931] fuse: Bad value for 'fd' 13:57:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fc2e7979d215998531fa1b8711860750aebb9e64d855e6bc5934d2fd11295c7a5b9c8171631d3986bee05ac6f6184bf90f1568a7b0824a5cc524ed944226c5f579c37ba6869602251e48e35ddbf93f5b13e97c67f2a1cf299844b4a753465d97277d8c1faaa035b136c3549840ad23e0b4c49981d51", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000000c0)) 13:57:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:18 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc7}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:18 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 570.461117][T27944] fuse: Invalid rootmode [ 570.526417][T27949] fuse: Bad value for 'fd' 13:57:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x9000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 570.566731][T27954] fuse: Bad value for 'fd' 13:57:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 570.595725][T27954] fuse: Bad value for 'fd' 13:57:18 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x13, 0xb6, &(0x7f0000000180)="0cf7a82b3c222dda44fbd3167c5c74291edf69", &(0x7f0000000200)=""/182, 0x800}, 0x28) sendto$unix(r0, &(0x7f0000000380)="501219ccf59e4170700f5b350f56555639a0cdc5524268d1190b1b29dc67658f821b41f75cdfa055e62ccd57552a", 0x2e, 0x8000, &(0x7f0000000500)=@abs={0x1, 0x0, 0x4e20}, 0x6e) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x800000, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x80}}, {@mode={'mode', 0x3d, 0xfffffffffffff956}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode'}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0xa1}}], [{@smackfsroot={'smackfsroot', 0x3d, 'bdevself\''}}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, 'group_id'}}, {@smackfsroot={'smackfsroot', 0x3d, 'mountinfo\x00'}}]}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 570.677988][T27958] fuse: Invalid rootmode [ 570.744501][T27962] fuse: Bad value for 'fd' 13:57:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xa000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:18 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 570.911755][T27968] bpf: Bad value for 'mode' [ 570.988201][T27972] fuse: Invalid rootmode 13:57:18 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 571.032265][T27975] fuse: Bad value for 'fd' 13:57:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x14', @ifru_mtu=0x1}) 13:57:19 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x10000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:19 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc8}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:19 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 571.436441][T27991] fuse: Invalid rootmode [ 571.445186][T27990] fuse: Bad value for 'fd' 13:57:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:19 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xc9}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 571.608661][T27968] bpf: Bad value for 'mode' 13:57:19 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x20000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:19 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = getuid() syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000002680)=[{&(0x7f0000000400)="04491fbbbd143e202b7201b1f25d0c58bebd94296c5b5e8bb49631338ba4bfc112b7f52b1702aaab016ea8a01117e2cfd90e57a498b960bbfa095c0009134bf0449cc8bfeaeac85d0d41fd6b8e7016c8899e7c51ca5b921a26dfccd92863403c2ad38d0cf545d65b0b8106e9e4cda82882f3f1821c9f2a7dc57e5a3b6e530aede7f2a28e8d94a86752b8a67ed37c77066a4226c57cbac6069de17062d33e939882d250feeced01a06b4f7e81c4585a7523779b7dd7f8b4b80bdce4d30e9780bb787923bba0d25ae0ecae42114de6f7ead7ae7b43e3c265c8d0392832c07e8943a1562bcc2c83b9cfa50fa2ca5d2268eb548afc9f4da68ea34aff3fa11c746ee0e8537c572079f9b549f65cfc16cb3223ae5178f0cd52dce4d9f48917a7bd054168f11cc5fc05c64c90610692b74b35b0189d32fe50bccefdfadbb3ca0c716e7f079376c004bb0a444a2fe71b93ffc589870b1cf2dcdd834da858b732d168e38da04b992754256ffe4f7063d6ac666e8d86c2f0df81734859e54b1ca54b2d395c95c4a40aa1522182a2ebd6e44213a72a70ca61c77579b5ea6ab1de9f4b19c3cbe24a94d3af8a612ebf6b3904dc4182fa52b1055102d4b6c73ddfc7e26442a0483cd51d27cc0631e18682e85d4e2ba458a47684907314be1f5b5282ba2459de9f1614d0a81e28be39de4d969d5cde5df2625a0ddb4871565bbe1ad420234a40678b6cd98f0a7bf6a1bd17f4dee38de47d3c1d63d2ac77b299830f489f64e7e43d3ed72edf555dd5f725d05069b7fda3320ebf47464a17fdf232f4fc4162057d66f570737e82904bdf25070d7ba099392143ed7b8e44ae1947bbf9c054e2f11ac9d2a6c6d9061afdafbfa909a990ddc0a14b34740682b2b1249581a3ef7b6b2881447cee08e12c1f4ac78eeb2dbc2efd126bec683dc4010e1b8cfeecdff78e03ebc7398a4cb13ed7c32b681d6c1061e14d695f9c5e2f41a5870e8b4562681d7daccde0befa96d830c14944c8abb00c6b233c2e573ac7f784f75fe1be57b058188b4a470512241c7c10d802d155369b6049e23cd94c63e52e5b1a4eaf6adcef77e0c5b259fac94a11c1aa3d9c99797dc064df27eab088bf33027da2ea037563485cf75fd903a506579f48c52095865cd2bcecba1b12a2bb25a6314e0310e7404045883a8c73ca03e6a301d5be5a64cbf1d1f0f210c125103496de64a92aef0f792174bf449b073e64633e17f5d6201514c81b4b97932ce2fed7a348c1b166961f289367fa710c48ff41869b135b3ab11c401e767a3ec4b0291a257a58f89e2aad04a5e1ad6cf8ce46584b73197fdfbc178bf6e32b6629348b801ce39aeed4f3ef81980386f0849f40f4f77162f1c8d6aa046fbebf406edf31160d65e914d9e96900e8e039f88ce87926e335c6016a58838956ac0e7a8bda06e6c2b6a21c6ef9664393760f89d7c414eec754528cab5eeaca91ca045bce7f124fa1712000db1ac6fd39fd4eb6b6baa0ba8565ff392f19bbedd37bf04c186326b3f1ca7f45ef64fbe8d0bd62393a60f404f3c7eb60ef4532a39f9615d4e4205fa5bdd6f5e2a5a4327c3ec9811a3d1cb1f2add3428cb7d48cb53fd892f112bad8e77286b75abe0553529f4a2aedf001da24a7f4b278ae0ac92ee8daae4488093a323682dd7661b71812b192f5fccf108f4f2133f6f992d84cf0f12170f21b121601510cc8fc70f986ea32bcbd328127e44b2a258c2acb95953ab60d0908a335c3d6759b60de5cf158ee805ec6a16c8d29f9a4f993a642d6fcd4ed501efdfa9b040524cf15be8f6e434ac2e1f8bfb8639e324edf23b27e4f47d0a22fd53fcb7c4c22790cb6baa9290bb8aa4fc59a34ff415b936a1dd00c463e022b913715ad3bb1009c44bdb09247a50635d88d15699473feb5c220b6e14faddd25aa09c61f68bc0f52a331c84f6725f756f990de1ff6e20ae359706f5f650812a3287a0ad9711f2f9498d7b8ef0030831518db37f76a5920ad931c3db691c13f0cbb5ccda816a70b72ab0499b8ef4f5268754e78486fac3c07f4dd414152890904c1531a0d04a66db3ca5de5090cfac0b036bd78307f75551947e3e91184c1a235c950e91580fe8794ebd6f2c1ebbe28a2b17e1551a3774a7289f69a8f79327665fa9c8a5196a84f74fdf232d1efdba1b69abc17cc40f34f793e4ff47ba6fa3a2eee4822f444e3ba15e9cdf8a56ed1dfd4292059df0c714493dcfd7f91532d7b76698f337a65154ec17d7ef7ba764726e3658ac4fe276295356245270815d1fcb2445319ef707a35b557df8eb0489341543533e18a33578363a52fdd263a31b7c25a545e5e3145847b03594c892662420ff2de31c47a2ca49593d106d2abee04ff0565f49b1e1d4aeb2dd90ba2b27a92fc6ff5962e9c1a9bd35e0bf4dfeb92efe87d4a3299a7156912fdd782e674cfc7d286dc9136bff65441f65715b996c239994227d0320866e8dbd0a2a1ee64d761ec60b641ebefa4a67b466385fc8a19a70251f6071f8bd6adcd4fff5752a78be3085af76b9ae1e6c9836af7840a1de0cdc3268cd729e342455c413bbfee01912cf7eb20c949d9900edfa214998e3aa988edde32c48ea3e2e7dff3ba5a71e942aed93d0bfcc1a35fb9475523c0ceb64a34760262845f022c86644b20d4964c6094ddab040b7d8ea2c915d90a5ddef71936712974fe5dd755d0901a60d80631f2db0787f5885d9f8dd9ee99d46693c8298dd347088c6c757bc8e85244634e77b124dd8d1bcf880e1dd20d0be3ba5b508f9f3d063614ffeaab6d3e05265b5b05e3e8e8785c69287cb1f8c3826c36e7ee8673ef4d90b60255ee8bec18af4716ea19d75275791f3a8c29137cf80d5933b0a4e41d482d5f5793fb175180e01c754cdc811c50c93e77cbc7dda2aa9141aadbb08fa55c74056f414f9994e04f009005de9003809fbc579f385b8d3f2a4c44b0a3c6f647d4354a476024f9b694d5844c624b396bf4836805ed5570d68e4ad3a360a7a975c85d9369f3d3b63a87f5b0a95800cf33192fc55351a5c5b3409c7b90868e8225cef9506148b8b2e2d1afcbafd7ed5f9282530ace1ce9ad8d9af22c34ac694597bb6fee73ee4e576d908fdddaee0cf35d0b06b3ce0ab02b2d794c791f73646830a60b3f0344d22aec999302ef91e3d470e7c147566e0f126de24d958dbca5433cd7bb9a6e002dfc1ccef65d49309665ce7e54302ef9841fbe1e81f204ee19ddb869143d57d614405504af0bad43a05412df5bfb722ece755d75bf07083bc4ff668363e68c35dadb792c77b579a3831681edaac466959090ebf60996523f77d22a50d2c5bd87132c2fe019b11c119027ac88c024efeddc6b5d3c915f9df4659d2f73130f3eb3baa5702ee1f25f876801a0e1633e7933763dadbe921291761b275b0b42120899ade700732e9d0cbc7d7aa2ef17d2e06f285ac67b60e97438c4cb925711f7edb5fbdc67e70cdb6ee286a651947c124d2c36a37b2e5f45270f650e55e26b08e0556ffc4b021098dab3510f6d3b2499e1cc59ac3449788a1b25030d496f45989d27fe2a7346e97e8769c42d38c5355b2848efc7d08361be86d704dd6d5beacaabf7e2d663226cf8a429cca6f887f1235a2ae320240f5fff9b4d80a78a26de46a7df6dd39cb8d1c5ebf1233c5cd0acdf9885f85d48b014663cec93d1a637f000b3f182a93f320cf3b02a91ec4c498b5eeed1030c3a8914c956012ed8540be05320063f5d4c79b2de3b1f10b6676eeadfd71c556536b1d8bda3ee2cc476a651a58e13c7578dae4f97f021799cc61862e24a6326ec124db8df41d3b2c44ed73a5f330569dfef9b00ad4cc07130bf16bf17e44226d26bb2bbaf3c168bfb6fae27e60520e3702b70de089e28de982884a8be5a851b233de77da01e683576dd668c85e29a7e3c7ee41527620985958f9d7a13b486d48cc465721d2bf0ae5be8a7b3a849769f5c5860603cac93ca62e8740fb9d55c221050af9b8c6c0892fc4d03c6f4682d55d0bab7124f917f22f08f4b6e35b4b7f2dab6e94e5e8291346013176b1ae0c581152c3e0d5e97d252624ffb681ff9371040c7c02511e2c9074a556087e23403125910ea94c20df65541b8af075282ee7c9cd20c81ba19001e7739ca547614b1f7ce92ae6751602705adb2216ab73a1fa3b34d9644a1d667f4a4ed98dd20695e9056cd2bffd5f0d2fa5f4d0ffc294d0f70c61c81fb9ea1b25da1a3d325feca9fe896004ca41a36a4182cddd3eca0197c5d912ebd82707fba4f3aa46b96b058086d1b976c858a5c9ce2d766f5396cf40af445b8dece895f26d517eda19467c9b0633c73d040e1ffb197ffef65ba00d47f1a1a8ab7a5884c11a12044537cef0f45596e126048753fbd18ff37719ca8c1c2d98a1932422e74958c6b60d4e40b5cb3e165219f67d6c746be6c2548729362cf8d52998dfd94359bb0bfbd3ac51416dc0d746234b9c93aae7000d14784e10d1823366970e9300f8d9ee06796f6af32efc21855a3d16cab3c3c7b47e5aaedfc0c0f3f7fa614a43ef4f8abe5a2211ea9bdc8e3e6598af4cc685440ee78f6ccf16d6acadfe1f555d61faa4f6b2e621c2f8d6dbd3fce5f36bdb268c4108db2fc1b1f041e47d80a470962698ed22e787bb4e1d3eb3f7e547391f9561653064de1147ef57f69504bc75d0f6131afa1556c715deae4e1b88b1b4ad156952dadb879aaef82ceee2f807cf78bad07ae174cc021b8ef468b69bf44b02aaac9a5ed12d7752a6896568f0067de7534f666c4f77e4240ff576e2e5aa438f92a1c08dae89891313fa6ca93bc93c776a2a714d9f0bc0a022be5b2f9caaa2700fd9933cdf49a7138ec5e23fec025d2ccabbe04973ced0f62e8dded7bbf7baf317e2d2bd6cbaa6624ca7801a40253fde09d5092b3008ab37d223b7e8c05ab77905647a74ec11b55b9fd8fa40b6b6dbed4b2a9a1755b2bcf04c67ab474a3024c2b6062ff7381e40bab2a3fc9c0897936dc29a28f6404c6ae12ee97ccaf2a6a6e0e101cb03de6b39a5895208183202bdb869d43af3127b63fa4d5c3aa69253c99586faf40abcaa37ce2240666dc572ccda873fa6853ab82189285831b9349b62110b78ada9bb7663c7f491e040ed93ffe00654e343c9d6adfe2460002dc1a5d03c14d9bec9f30ec893785b7363db8bacb0d1018bd9d42b149f46eb3770b75bc445f76920dcfdac53b251db69c588216bcc92141edb0bc03e0cba6ffbe6c7400e3ebcce330a140fdafe9ec021030aa33103c9dde0210e1285e4789eb18697aca9abc4dc2990546635a40d0bbc87b203b46275013826c62d8f7632d60c45dd5a61c2ed483f026576844f23a30eb9ea5b38fea0cc8f9f522b3d4cdc47fe39a2d34b673587187395200d3bd526d3de153695e67baf5bfd15b8f70623b7b7a0b78ec932fc68bbca6fd1924aa6fb5a5a0befb5b44a8dbdda3c7fa30e99f63d5c51315df356c83871b4fc7a21db1cd5c25da52198b9f8ab852166c470f6a889d59816b385417b855821db2e9d462b0504da3786d64f2fc3c410ba24a741c6770c158038c22a23ec57516eca0ccc35de2f7886d47f16624a9598ffb7d2b6ba81f5c9c33416692c62eff87322e4861fd8fbfd3537517e132a72720823eae415b316ad4e22c3b58a6b8eaa9735a9ded537fd4fc41403c63619c89c15065862582b49325483b44c084e07607d410e4c1515f8583a873c7edd81b2c1366ca2cd028abaa1954e50e18379ec5a088d79e46c523e5ee2a1553c3eb2488c4057ef5f9d1fa438ccaf9b5af", 0x1000, 0x5}, {&(0x7f0000000200)="f2df87e57936c045d9680017d1cc1deb25232949a30b27bca7a84e5e88d2a65a2968245e3f4af109d7fce88ce2feda91b47e7c8690496129a74fc79f05b0c4dc30eb0cbd845cf1d598c6e97c385d56be980d1976893dd1dc1433a706e487856e7a8243c7ee25abff1c0a9171f8", 0x6d, 0x50c}, {&(0x7f0000000340)="ff7c40bf61bfcc7ac74a6fb6f99b9a34a6b5c702cc6a6715744964d9a91cd614c3b2ced1d713a9b9c4667798ea24a0ef3d541543fa9bf268c850645ef49141a0b7cf7031764ffd75833cc2da37a9e1115d85ad349d7ae89fb7e380bdd38666933faa1d7a5b2ac350b72fe05856dd2a9182ec1a4780edfed061895e2f9e", 0x7d, 0x9}, {&(0x7f0000001400)="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", 0x1000, 0x8000}, {&(0x7f0000002400)="5964e484ad6a0f0598595eea91befa1a67a17be22f6b30a66134a25b991be1fac1dce9e4c7389ed1ec706f5c3d3fbd475a458bbdf7521d537bc3a80d336ce2a847ef0dc5d95ba713159e7147ad2c51e170e31e869e6248ff4f321b16701be5c93a47c9aa23b6d38965b7dd29a4a4c9658195a1f22950e69c72001f60a3d8779cee152e65705eb63b8550f3d39b97a35aa630d934bc9dee1463a74df3e6ac89ce6fd3fff360343dded0d5", 0xaa}, {&(0x7f0000000180)="2b2ee669efc50298106dcab2c871cac981fff1ef5f0370e500ec459ae12aae0bd59ff3420f3d", 0x26, 0x946}, {&(0x7f00000024c0)="a771b5a6d463a9a53093b54c2ce63b84b00e1c3745ed1cd1c60d6cbf1c493b130157e149dca320fdacf1ca9c6b9602aa35439928dc218916a21988b9b09dc592328fd7cc01d74dac43465523ac7123d797a3aefef1883446d51bd508f86c5a1884b06d32a3c75df86226771967bf01419622393c631ad8d500e5806ebb900e04c255b436123183acc07ffad52db80706d357489a06471c7342b679caece8d87cfc653e92ed9096928f7d5a0ce91228a7ad8653c11a8da3efb6", 0xb9, 0xfff}, {&(0x7f0000002580)="9a8fee8542b7be6e128c997fb8c45f7c32ee2af72f59644cde74ded04212015eafefa839246a178eb9ba18aed9b53a3c9d9996481c13108d985418a86682d6262e974aad2afbfead12976e7fbc477aa0b60bf61cdc4a613ca85e80e9da814c4f1d4f5b13dcc103ef6c34e77b201e4472b02be455557ab53b1d2c04b80ca2934cd048e9ce509d7a94f46c397c90da8ef6feee0ce612f03380c193f6b341c7050d157d9a1b52e0ef78b5b1fc7fd5b2547ca2641b53a2317959aed84e111965261bcfa44c68b23233eb763e69d6f7af80a5841f66b892b74e1b1816b62779e3f0b81e8138d8", 0xe4, 0x4}], 0x0, &(0x7f0000002740)={[{@noquota='noquota'}, {@noquota='noquota'}, {@usrquota='usrquota'}], [{@euid_lt={'euid<', r0}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 571.856830][T28015] fuse: Invalid rootmode 13:57:19 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:19 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x20100000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:19 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xca}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:19 executing program 1: socket$l2tp(0x18, 0x1, 0x1) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:20 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xcb}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3f000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 572.611716][T28052] fuse: Invalid rootmode 13:57:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x40000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:20 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xcc}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 572.896401][T28067] fuse: Invalid rootmode 13:57:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ptrace$getregset(0x4204, r2, 0x200, &(0x7f0000000100)={&(0x7f0000000200)=""/116, 0x74}) 13:57:20 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x48000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:20 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:20 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xcd}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 573.260635][T28082] fuse: Invalid rootmode 13:57:21 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:21 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xce}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4c000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:21 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 573.507444][T28101] fuse: Invalid rootmode 13:57:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x60000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 573.733333][T28113] fuse: Invalid rootmode 13:57:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000180)=0x0, &(0x7f0000000200), &(0x7f0000000240)) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:21 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xcf}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x68000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:21 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 574.116938][T28225] fuse: Invalid rootmode 13:57:21 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:21 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd0}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6c000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 574.487213][T28349] fuse: Invalid rootmode 13:57:22 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 574.613681][T28358] fuse: Bad value for 'fd' 13:57:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000100)=0xfffffffffffffff2) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='fuse.', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000002,user_id=', @ANYRESDEC=r2, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:22 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x74000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:22 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd2}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 575.080421][T28474] fuse: Invalid rootmode [ 575.093400][T28477] fuse: Bad value for 'fd' 13:57:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7a000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x800, 0x1ff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) [ 575.362542][T28487] fuse: Invalid rootmode 13:57:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8cffffff, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 575.421211][T28495] fuse: Bad value for 'fd' 13:57:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:23 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd3}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xc0ed0000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:23 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd4}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 575.957478][T28621] fuse: Invalid rootmode 13:57:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf6ffffff, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:23 executing program 4: fcntl$getown(0xffffffffffffffff, 0x9) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000240)='net/mcfilter\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) openat$cgroup_type(r1, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:24 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd5}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 576.356857][T28641] fuse: Bad value for 'fd' 13:57:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf9fdffff, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:24 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd6}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 576.631830][T28759] fuse: Bad value for 'fd' 13:57:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xff000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 576.859867][T28772] fuse: Bad value for 'fd' 13:57:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xfffffdf9, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xffffff8c, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:24 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd7}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000a40)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000a80)={@loopback, 0x55, r2}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) 13:57:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 13:57:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xfffffff6, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:25 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd8}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 577.663751][T28915] fuse: Missing mount parameter(s) 13:57:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 13:57:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xedc000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 577.880382][T28930] fuse: Missing mount parameter(s) 13:57:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 578.043643][T28941] fuse: Missing mount parameter(s) 13:57:25 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xd9}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x10000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:26 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fspick(r0, &(0x7f0000000180)='./file0\x00', 0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x200, 0x6, 0x40, 0x9, 0x18, 0xa564, 0xfff, 0x8, 0x5, 0xfffffffffffffffe, 0x1, 0x7fff}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000100), 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0xa, 0x10, "9521cd58bb2fb54f2b6f6bf8862f66fd5392fc07defc1438cd0a3eedc27efd8a62ee647d2cff39c0c61f16cccde483815141148aaad8801d119b252fc4cf863e", "4c6cc278476988e574544df97a03cf11952ede564974a3d7ebfabfc0d85c44bf", [0x200, 0x2b49edfc]}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="060140", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67706f75708a2202a4ab2d02d192bd74daa4563bbc109734", @ANYRESDEC=0x0, @ANYBLOB="2c007c598b4f00c534e7c955cb7387071a35fd68970465d0820a7e93fbd97f7f30d71c583ab4c440faacd4a269ba1c764a358b78c27b2f6e45a4b9fe19116a6a0f530895e102974bf94deed2c3244a33dc399081154db1bf95abf2732c87e88a58ffbb7517fdf2d680a4d579519495d5ba78f8b69368c429"]) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:26 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xda}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 578.589173][T28960] fuse: Bad value for 'fd' 13:57:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x20000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:26 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 578.760937][T28975] fuse: Unknown parameter '@0x0000000000000004' [ 578.801107][T28980] fuse: Bad value for 'fd' 13:57:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 578.841065][T28983] fuse: Missing mount parameter(s) [ 578.848075][T28975] fuse: Unknown parameter '@0x0000000000000004' 13:57:26 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3411"]) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)={{0xffff, 0x17}, {0x7, 0x847}, 0x4, 0x1, 0xac54}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:26 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 578.963250][T28988] fuse: Bad value for 'fd' 13:57:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x40000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 579.184003][T29000] fuse: Missing mount parameter(s) [ 579.284023][T29054] fuse: Invalid rootmode 13:57:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:27 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xdb}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x80000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0x148, 0x238, 0x238, 0x148, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x4, &(0x7f00000000c0), {[{{@ipv6={@remote, @dev={0xfe, 0x80, [], 0x24}, [0xffffff00, 0xffffff00, 0xffffff00, 0xff000000], [0xffffff00, 0xff, 0xffffffff, 0xff], 'eql\x00', 'gre0\x00', {}, {0xff}, 0xc, 0x401, 0x3, 0x20}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d2, 0x4d4, 0x1, 0x5, 0x3}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x2, 0x8c6, 0x1}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7, 0x7}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}, {{@ipv6={@loopback, @rand_addr="1aa1c10c08b3782913f6f27157a8b5e7", [0xffffffff, 0xff, 0x0, 0xffffff00], [0xff000000, 0xff, 0x0, 0xff000000], 'teql0\x00', 'caif0\x00', {}, {0xff}, 0x4, 0xfc99, 0x3, 0x4}, 0x0, 0xf8, 0x128, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x33, 0x8000, 0x2c4c, 0x6, 0x2a, 0x40, 0x2}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x9, 0x1f, 0x41}, {0x3, 0x4, 0xe4}, 0x19d, 0xfffffffffffffff7}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 13:57:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 579.470100][T29115] fuse: Missing mount parameter(s) 13:57:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x100000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:27 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xdc}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 579.556470][T29117] fuse: Missing mount parameter(s) [ 579.628198][T29117] fuse: Missing mount parameter(s) [ 579.635840][T29124] fuse: Invalid rootmode 13:57:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="25a5451a52bc03699228e96ccd5c66643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000<0000004_id=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_^d=', @ANYRESDEC=0x0, @ANYBLOB="0102"]) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000180)=0x5) delete_module(&(0x7f0000000100)='::(vmnet1\'eth1proc.em0%\x00', 0x200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgrouQ\x14\x84\xa7/syz1\x00\xb2\x8a\t\x95\f8RC\x94\xa0\xdd\x84E04M7\xa4Bs\xde-\xff0S\xf2*g7\xb7\x91\x95\xb6\xbd\x06\x03FC\x1c\xd9\xb1\x04\x1b\x14o\x86q\x9e?\xc9\x84\\\xbdT\xba\xe3$\xb6|E\a\fT$\x19-\xc7\xa9\xfel\xa6\x16\x891\x05\x93\x93\xe9\xd8\xf4.\x11\xb2R\x04\xfeZQcJ\x02\xb2\xf4\x11\xd0\xb4\v\x9cKW^\x9a\x87:\x1c\x892f\xfc\xa6fa\xfd\x83\xe4\x8a\xa4b\xe1\xf7O\xe17!\x85\xfb\x02\x84\x1d\x90\x9c\xbcK\xaa\x8eNz\xd2\t\x01\x99?\xb5\xea\x999fi\xcfL01\xd6g\xf9.U\xa3\x84T\xd7_C\x19\x8aZ\xfd\xd8\x04U7\xbb\xfb\"\xe2\xcc\x1c?\xe5\xdd\x0e>^\x92\x81', 0x200002, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x4000, 0x0) [ 579.755469][T29134] fuse: Bad value for 'fd' 13:57:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 13:57:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 579.946408][T29146] fuse: Bad value for 'fd' [ 579.959523][T29147] fuse: Invalid rootmode 13:57:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x200000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00f3c7b827beb26d17311459260b68acb88a482fbe87f2b132ef0271ceddbbc0b9d79bc213592d6bd57570402affe39902fcbf34449c51024e85b28611d525c1876c447ccaec428bb6a47c976e7e232c7d3e3a8646e8505192b64782053e110ff3b81b9bec5cc1d8928a7fa121b3c801b3f164c7"]) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, 0xfffffffffffffffe, 0x0) 13:57:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:27 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xdd}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 580.390686][T29164] fuse: Bad value for 'fd' 13:57:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x300000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:28 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:28 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xde}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 580.657820][T29178] fuse: Invalid rootmode 13:57:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:28 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) [ 580.847929][T29189] fuse: Invalid rootmode 13:57:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x400000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000002c0)={0x2, 0xfffffffffffffffe}, 0x2) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c7215e33f266f6f746d6f2a72e3218491a4666327c4b350243030303030303030303030303034303030322c757365726874d43e1370514202032be7aa867554c43dd30000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="cc7e8346cf39eaf1078beadb81c12359e651b6"]) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) 13:57:28 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xdf}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:28 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ptrace$getregset(0x4204, r2, 0x200, &(0x7f0000000100)={&(0x7f0000000200)=""/116, 0x74}) 13:57:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x500000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 581.339155][T29311] fuse: Invalid rootmode 13:57:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x600000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:29 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe0}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 581.444008][T29314] fuse: Unknown parameter 'r?&ootmo*r!fc'ijP$000000000000040002' [ 581.477243][T29354] fuse: Unknown parameter 'r?&ootmo*r!fc'ijP$000000000000040002' 13:57:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000180)) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000200)={0x3, @null, r2}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000240)=@sg0='/dev/sg0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='omfs\x00', 0x20400, &(0x7f0000000380)='trusted/lo[systemmime_typevmnet1\x00') 13:57:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x700000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:29 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x800000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)='!cgroupwlan1\'$vmnet0\x00', 0x15, 0x3) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x900000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:29 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe2}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000400)=""/194, 0xc2) 13:57:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f00000000c0)={0x1, 0x2}, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) timer_create(0x7, &(0x7f0000000100)={0x0, 0x5, 0x2, @thr={&(0x7f0000000500)="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", &(0x7f0000000200)="98d0a374322f4ae402ae00619b8769237098fcc17157d02f51c6676612eef1872273bbe08a011c6b82882a54cc5c32c734b09037cc3ead4dbb6922ea5f9072008df336e07ca881e393639d880577fdccf438040359fb87f940e01f2ad71e4c547ecaf93127f10d5e54d07ddb8672f9ff15e6c195fc4cd05c1c8a6da1014c78087f3aab9303171da6e0feac95737bceef4c00d2edfab4af0d96c27aec995d59a270041f1fda14bd364fb6f6d59672067ea8130eaafa58edee078386d4dfcf183fea9f4ed704ec96956a352e36b5ec36ee0a67f06765568ec98e0d323d1ddb"}}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f0000000300)) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677f6f75065f69643df01e3e43eddbadfd687bcb24a40188d8482155523228a077033254f90189a41a303eb80552f2aa0e2abba106fd867b9f88a20884ec55a4b6b06ee6a5a1214123afd15301caf6250d79031d5e6d7779d9218f3335024ea4b5caf84892abe5d8016e64345638c6d53b659454cc00b36e933ac2802dc3e48ab2044f36", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 13:57:30 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xa00000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:30 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe3}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000400)=""/194, 0xc2) 13:57:30 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x1000000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000400)=""/194, 0xc2) [ 582.799180][T29589] fuse: Unknown parameter 'gou_id' [ 582.855068][T29590] fuse: Unknown parameter 'gou_id' 13:57:30 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe4}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/194, 0xc2) 13:57:30 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="e9a00e578e27412875649cf29d3359bb701ef56b688f56d0fd5cb550988d835c9ec3a4a05985342ed163e04fc1cc9b04507d5e6629c33b280b0c4a4a5b30ef269a79ac2379f15940fa87fa51fd798480d51f0f2225cdf891d7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75f165695e3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x40}, {&(0x7f0000000200)=""/175, 0xaf}, &(0x7f00000000c0), 0x43b5074fb9719d4e}, 0xa0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:30 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2000000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 583.207260][T29711] fuse: Unknown parameter 'W'A(ud3YpkhV\P\äY4.cƠP}^f);( JJ[0&y#yY@Qy"%0x0000000000000004' 13:57:30 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe5}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x2010000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 583.346419][T29711] fuse: Unknown parameter 'W'A(ud3YpkhV\P\äY4.cƠP}^f);( JJ[0&y#yY@Qy"%0x0000000000000004' 13:57:31 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x4000, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000200)={&(0x7f0000000100)=[0x101, 0xfffffffffffffffd, 0x8, 0x91, 0x5, 0x8001, 0xf85], 0x7, 0x80000001, 0x6, 0x52e9, 0xffffffffffffffff, 0x8, {0x8000, 0x7, 0x8, 0x5, 0x3, 0x7fffffff, 0x101, 0x1, 0x5, 0x2, 0x663a93c8, 0x5, 0xff, 0x9, "57e5411383a52ce465900abe37d8ca2b6e832cc36882831f71bdad361d0270cc"}}) 13:57:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x3f00000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:31 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe6}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4000000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:31 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe7}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4800000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:31 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x4c00000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:32 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe8}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:32 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6000000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:32 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xe9}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6800000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:32 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x2200, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "30179982b0af9c6fecd6210a4f5aa04b3b8f3d44"}, 0x15, 0x2) syz_open_procfs(r0, &(0x7f0000000180)='net\x00') syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x6c00000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:32 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xea}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:32 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7400000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x7a00000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:33 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xeb}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x8cffffff00000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="00e2ffffffffffffff5eac0ff46f31a5ceffb6bda8eb26cdf1df6e5b4739f99fd75e06f48d322fc6e9fe455ae0fb3d504cbc8e00a6ebe4ee81b6e25c8e2333b0427c6511b9f56416595d257627a1afc171e3f11f451f79756570355eddf5979a6675340f1fb9dcbc8133b1b6ffe75483857627c72f9b28cb397c5cf55f83696912c7a7b4977ef6579098df1458859aaafbd846a5a4e7242a67660c2a890124bef92787e75ef6", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x8000, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000100)=[r1, r1, r1, r2, r1, r1], 0x6) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf6ffffff00000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 585.768555][T30142] fuse: Missing mount parameter(s) [ 585.811594][T30142] fuse: Missing mount parameter(s) 13:57:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:33 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xec}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xf9fdffff00000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xe01, 0x8253000000}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1}, 0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:33 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0xff00000000000000, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:33 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xed}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'\nd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 586.337929][T30172] fuse: Unknown parameter ' [ 586.337929][T30172] d' 13:57:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'%d', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:34 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xee}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 586.561641][T30185] fuse: Unknown parameter '%d' 13:57:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'.d', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 586.708126][T30224] fuse: Unknown parameter '.d' 13:57:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:34 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xef}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'/d', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x1f, 0x20000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="c0e3f0437ec2134b72fe6f1ad118573c7ab5f93a288860c28a035c9068f442b69937f6641de356cf9d7a24766bff6fbaa7a1824d5ca33f51bca189cff7", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) 13:57:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 586.987198][T30301] fuse: Unknown parameter '/d' 13:57:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'\\d', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 587.109383][T30312] fuse: Unknown parameter 'C~KroW0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 587.161805][T30314] fuse: Unknown parameter 'C~KroW0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 587.554227][T30335] fuse: Unknown parameter 'f [ 587.554227][T30335] ' [ 587.626786][T30342] fuse: Missing mount parameter(s) 13:57:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 587.657959][T30345] fuse: Missing mount parameter(s) [ 587.751052][T30350] fuse: Bad value for 'fd' 13:57:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'f\\', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000700)={0x0, &(0x7f0000000780)="0b906e7c1461af3a238c76"}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x400000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x87, @multicast1, 0x4e23, 0x1, 'wlc\x00', 0x20, 0x1, 0x58}, 0x2d4) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)) bind$unix(r1, &(0x7f0000000500)=@abs={0x0, 0x0, 0x4e20}, 0x6e) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:35 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:35 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf2}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 587.998571][T30357] fuse: Bad value for 'fd' [ 588.050880][T30367] fuse: Unknown parameter 'f\' 13:57:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000200)="c6cda155dd7493248d261c689fcf111c795e968b9441561e520c64e25e0395c64d7e311cb25707896fddce69ea3459f5c7230e0e823edf98bc77ba56244391f6e57b3907458c1e5cd9a8cbbb684a6560749d40b056ebb94a25a936611b9838f421ab9780296ddec288619bdf1f6dee2a9801e0a9fa829f3a4bbd43362ec030a3611c6128df2929ed52f1006b2d32c0f0d3a5e16c862dded3bbede3260838f4653352942d059aec9ecc859a6dde52", 0xae, 0x5}, {&(0x7f0000000340)="95067066f0a4edb80a5a59edba19e7f79cb6f97457541a84ac473072ae1bd35be29b115849ea82a6a3dd478e53d63140b7e05bba688fc069854b1bfad72c4dee5867b7e1a6b8f0ee1b752b6cf9eed7d8439aa6ba46", 0x55, 0x4000000000000000}, {&(0x7f0000000180)="b84699c1eed0f05e45f8add1ede8220ed9ad", 0x12, 0x7ff}, {&(0x7f0000000400)="81d29d88e5960dfdecb029b28e9b29652e45895dd58a6a8e6785e1c23f1de49462342287d60d7d2414ba5fa6a9c997871cca708663e6eebcd3d0f5d31eb75ae30856b5d94488a6fc98501f12cc139ecd5aeebdf162dad1ccef31eea4949bd53b80b519ac78cac29292f6315adb272ef07689aa8cb45f868b1648e70235a4dba217", 0x81, 0x8000}], 0x8004, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x7, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 588.262276][T30377] fuse: Bad value for 'fd' 13:57:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2e, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 588.340320][T30383] fuse: Bad value for 'fd' 13:57:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:36 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf3}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 588.491443][T30388] fuse: Bad value for 'fd' 13:57:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x3c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 588.771816][T30500] fuse: Bad value for 'fd' 13:57:36 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf4}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:36 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000200)) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_SET_PIT(r4, 0x8048ae66, &(0x7f0000000240)={[{0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 13:57:36 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'\nootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:36 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 589.190954][T30527] fuse: Unknown parameter ' [ 589.190954][T30527] ootmode' 13:57:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'\\ootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:37 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 589.459227][T30538] fuse: Unknown parameter '\ootmode' 13:57:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\xff', @ifru_mtu=0x1}) 13:57:37 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf5}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:37 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'r\notmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:37 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 589.727007][T30550] fuse: Bad value for 'fd' [ 589.732612][T30552] fuse: Unknown parameter 'r [ 589.732612][T30552] otmode' 13:57:37 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 589.981049][T30565] fuse: Bad value for 'fd' 13:57:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x2, r2, 0x3}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x2, r2, 0x2}) 13:57:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'r%otmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:37 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:37 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf6}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:37 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\xff', @ifru_mtu=0x1}) 13:57:38 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 590.281336][T30671] fuse: Unknown parameter 'r%otmode' [ 590.285725][T30676] fuse: Bad value for 'fd' [ 590.316080][T30671] fuse: Unknown parameter 'r%otmode' 13:57:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:38 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf7}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'r/otmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000c80)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000cc0)={0x20, r2, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 13:57:38 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 590.726044][T30702] fuse: Unknown parameter 'r/otmode' 13:57:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'r\\otmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:38 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:38 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 591.015987][T30719] fuse: Unknown parameter 'r\otmode' 13:57:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\xff', @ifru_mtu=0x1}) 13:57:38 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf8}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:38 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getpid() getpid() fstat(r0, 0x0) getpgrp(0x0) lstat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001180)) getgid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) openat(r1, &(0x7f0000000200)='./file0\x00', 0x10e01, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 13:57:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'ro\ntmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:38 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 591.367569][T30835] fuse: Unknown parameter 'ro [ 591.367569][T30835] tmode' 13:57:39 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 591.408977][T30832] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 13:57:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'ro%tmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:39 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xf9}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:39 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:39 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xfa}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 591.841345][T30959] fuse: Unknown parameter 'ro%tmode' 13:57:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x100000000000ff) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0xffffff88, 0x8dffffff}, 0x2a}, 0x2}, 0x0) 13:57:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'ro/tmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:39 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:39 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="c3", 0x1}], 0x1, 0x0) [ 592.148704][T30984] fuse: Bad value for 'fd' 13:57:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 592.241207][T30988] fuse: Unknown parameter 'ro/tmode' 13:57:39 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:40 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000180)={0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 13:57:40 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'ro\\tmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 592.479490][T31002] fuse: Bad value for 'fd' 13:57:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 592.512134][T31005] fuse: Unknown parameter 'ro\tmode' 13:57:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\xfd', @ifru_mtu=0x1}) 13:57:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:40 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xfb}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:40 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'roo\nmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 592.879207][T31022] fuse: Bad value for 'fd' [ 592.898713][T31021] fuse: Unknown parameter 'roo [ 592.898713][T31021] mode' 13:57:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:40 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xfc}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:40 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'roo%mode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 593.197487][T31040] fuse: Unknown parameter 'roo%mode' 13:57:41 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) getpid() getpid() fstat(r0, 0x0) r1 = getpgrp(0x0) getpgid(r1) getgid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) openat(r2, 0x0, 0x10e01, 0x0) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 13:57:41 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 593.359745][T31049] fuse: Bad value for 'fd' 13:57:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\xc3', @ifru_mtu=0x1}) 13:57:41 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'roo\\mode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:41 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:41 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xfd}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f00000000c0)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000080)=""/52, 0x34}, 0x120) [ 593.808200][T31169] fuse: Bad value for 'fd' [ 593.829614][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 593.846809][T31167] fuse: Unknown parameter 'roo\mode' [ 593.857937][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 593.881850][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 593.919700][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:41 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:41 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'root\node'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 593.947742][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 593.983886][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 593.991529][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:41 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0xfe}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 594.037328][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.117377][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.143829][T31286] fuse: Bad value for 'fd' [ 594.150861][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\xfe', @ifru_mtu=0x1}) 13:57:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 594.179805][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.189433][T31292] fuse: Unknown parameter 'root [ 594.189433][T31292] ode' [ 594.205614][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:41 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 594.252319][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:42 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x102}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'root%ode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 594.307636][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.335086][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.393141][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 594.450100][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.477711][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.504415][T31312] fuse: Unknown parameter 'root%ode' [ 594.512064][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.537172][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.554250][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.577477][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 13:57:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 594.602602][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.622707][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.653991][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.663981][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.673952][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.708253][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.734934][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.755647][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.780766][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.789055][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.797026][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.805339][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.814078][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.821619][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.829795][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.837928][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.845869][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.853996][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.862968][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.870505][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.891873][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.914617][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.923723][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.942364][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.950549][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.958395][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.966215][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.978186][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.986012][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 594.993969][T25867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 595.014082][T25867] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 13:57:42 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 13:57:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'root\\ode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:42 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x103}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0$', @ifru_mtu=0x1}) [ 595.125263][T31429] fuse: Missing mount parameter(s) [ 595.159963][T31437] fuse: Unknown parameter 'root\ode' 13:57:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootm\nde'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 595.413126][T31453] fuse: Missing mount parameter(s) 13:57:43 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 13:57:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 595.493103][T31456] fuse: Unknown parameter 'rootm [ 595.493103][T31456] de' 13:57:43 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x104}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootm%de'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 595.739408][T31471] fuse: Missing mount parameter(s) 13:57:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:43 executing program 4: clone(0x8020000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 595.865474][T31480] fuse: Unknown parameter 'rootm%de' [ 595.983056][T31489] fuse: Bad value for 'fd' 13:57:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootm/de'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:43 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) socket$inet6_tcp(0xa, 0x1, 0x0) 13:57:43 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x105}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 596.237498][T31500] fuse: Missing mount parameter(s) [ 596.286078][T31498] fuse: Unknown parameter 'rootm/de' [ 596.298439][T31504] fuse: Bad value for 'fd' 13:57:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootm\\de'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 596.597314][T31521] fuse: Missing mount parameter(s) [ 596.601974][T31523] fuse: Bad value for 'fd' [ 596.624546][T31522] fuse: Unknown parameter 'rootm\de' 13:57:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmo\ne'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 596.808135][T31529] fuse: Missing mount parameter(s) [ 596.847041][T31531] fuse: Unknown parameter 'rootmo [ 596.847041][T31531] e' [ 596.918123][T31534] fuse: Invalid rootmode 13:57:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:44 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 13:57:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:44 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x106}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmo\\e'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 597.253141][T31550] fuse: Bad value for 'fd' [ 597.263904][T31545] fuse: Unknown parameter 'rootmo\e' [ 597.271536][T31549] fuse: Invalid rootmode 13:57:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r2, &(0x7f0000000440), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0xfffffffffffffffe, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) 13:57:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 597.322682][T31545] fuse: Unknown parameter 'rootmo\e' 13:57:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:45 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x107}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmod\n'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 597.480590][T31563] fuse: Bad value for 'fd' 13:57:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 597.591384][T31572] fuse: Invalid rootmode [ 597.612600][T31573] fuse: Unknown parameter 'rootmod [ 597.612600][T31573] ' [ 597.706420][T31579] fuse: Bad value for 'fd' 13:57:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmod%'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:45 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x108}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca570286f7dc47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000200)="b9800000c00f3235000100000f3048b8568b929eb42e3b020f23c00f21f835010003000f23f8440f01ca66b858008ec00f20d835200000000f22d866bad004ec650f01cf66baf80cb8bb6e038fef66bafc0cec363e450f3066b85e008ed8", 0x5e}], 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x1040000004, 0x0, 0x0, 0x0, 0x4cc]}) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080), 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 598.153467][T31594] fuse: Unknown parameter 'rootmod%' [ 598.158457][T31596] fuse: Invalid rootmode 13:57:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmod\\'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x109}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 598.443043][T31610] fuse: Unknown parameter 'rootmod\' [ 598.485875][T31618] fuse: Invalid rootmode 13:57:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 598.525879][T31610] fuse: Unknown parameter 'rootmod\' 13:57:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmodw'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 598.778103][T31628] fuse: Unknown parameter 'rootmodw' 13:57:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x10a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:57:46 executing program 4: r0 = socket$inet(0x2b, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) readv(r0, &(0x7f00000013c0), 0x0) 13:57:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 599.029124][T31736] fuse: Invalid rootmode [ 599.048509][T31741] fuse: Invalid rootmode 13:57:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, 0x0, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x21}, 0x20000357) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x8, 0xff}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 13:57:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:57:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x10b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 599.306991][T31757] fuse: Invalid rootmode 13:57:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:57:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:47 executing program 4: r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) read$FUSE(r1, &(0x7f00000002c0), 0x1000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x20000007, 0x3f000002}) 13:57:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x10c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x21}, 0x20000357) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x8, 0xff}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) [ 599.854278][T31885] fuse: Invalid rootmode 13:57:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x5}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(0x0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x10d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r0, &(0x7f000000a180)=[{{0x0, 0x0, &(0x7f00000029c0)=[{0x0}, {&(0x7f00000019c0)="a0", 0x1}], 0x2}}], 0x1, 0x4000000) [ 600.145103][T31904] fuse: Invalid rootmode 13:57:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) [ 600.232166][T31912] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:57:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 600.437171][T31922] fuse: Invalid rootmode 13:57:48 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:57:48 executing program 4: r0 = socket(0x1, 0x1, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x306) 13:57:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendto(r0, &(0x7f0000000200)="b341bfe4222ca96c8991cf0c8dbd6200d2f988526e31dfc2552587e109db5156fa652be64cec45e8e5615dd43f5cae981a2649e1cc378bc5", 0x38, 0x0, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @remote, 'veth0_to_bridge\x00'}}, 0x80) 13:57:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x10e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 600.785002][T32036] fuse: Invalid rootmode 13:57:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x21}, 0x20000357) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x8}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 13:57:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)={0x2, 0x0, [{0x7, 0x0, 0x706c00}, {0x1, 0x0, 0x0, 0xff}]}) 13:57:48 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:57:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x10f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 601.160992][T32060] fuse: Invalid rootmode 13:57:48 executing program 1: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x0, 0xff}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 13:57:48 executing program 3: 13:57:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x9}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x21}, 0x20000357) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x8}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 13:57:49 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x110}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 601.474630][T32076] fuse: Invalid rootmode [ 601.564953][T32076] fuse: Invalid rootmode 13:57:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x21}, 0x20000357) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x8}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 13:57:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:49 executing program 1: 13:57:49 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x111}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:49 executing program 1: [ 601.933773][T32199] fuse: Invalid rootmode 13:57:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x10}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:49 executing program 1: 13:57:49 executing program 4: [ 602.226390][T32210] fuse: Invalid rootmode 13:57:50 executing program 4: 13:57:50 executing program 1: 13:57:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x48}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 602.613915][T32323] fuse: Invalid rootmode 13:57:50 executing program 4: 13:57:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x112}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:50 executing program 1: 13:57:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x21}, 0x20000357) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x8}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 13:57:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:50 executing program 4: 13:57:50 executing program 1: 13:57:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x113}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:50 executing program 4: [ 602.936884][T32351] fuse: Invalid rootmode 13:57:50 executing program 1: 13:57:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x60}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:50 executing program 4: 13:57:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x114}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x21}, 0x20000357) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000040)={0x6, {0x0, 0x0, 0x8}}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 13:57:51 executing program 4: [ 603.307769][T32461] fuse: Invalid rootmode 13:57:51 executing program 1: 13:57:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x68}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:51 executing program 1: 13:57:51 executing program 4: [ 603.605426][T32480] fuse: Invalid rootmode [ 603.670397][T32480] fuse: Invalid rootmode 13:57:51 executing program 1: 13:57:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:51 executing program 4: 13:57:51 executing program 1: [ 603.920838][T32493] fuse: Invalid rootmode 13:57:51 executing program 4: 13:57:51 executing program 3: 13:57:51 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x115}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x74}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:51 executing program 1: 13:57:51 executing program 4: 13:57:52 executing program 3: [ 604.275976][T32608] fuse: Invalid rootmode 13:57:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x116}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:52 executing program 1: 13:57:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:52 executing program 4: 13:57:52 executing program 3: 13:57:52 executing program 1: [ 604.586331][T32628] fuse: Invalid rootmode 13:57:52 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x8000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x300}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 604.919340][T32643] fuse: Invalid rootmode 13:57:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) fchown(r0, 0x0, 0x0) 13:57:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x81}) 13:57:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x117}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x100000000000ff) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x0, 0x0, @rand_addr="01b5ef85910252e6c4efa9bca4e63135"}, {0xa, 0x0, 0x0, @rand_addr="d9ae84d566afd5258cac14436b02c484"}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10006]}, 0x5c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x3b}, 0x2a}, 0x2}, 0x0) 13:57:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 605.199685][T32760] fuse: Invalid rootmode 13:57:52 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)) getpid() getpid() fstat(r0, 0x0) getpgrp(0x0) lstat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001180)) getgid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) openat(r1, &(0x7f0000000200)='./file0\x00', 0x10e01, 0x0) socket$inet(0x10, 0x3, 0xc) 13:57:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmod\\'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x118}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x0, 0x2d0, 0x2d0, 0x1f0, 0xd0, 0x410, 0x410, 0x410, 0x410, 0x410, 0x5, &(0x7f0000000000), {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0xff000000, 'tunl0\x00', 'lo\x00', {}, {}, 0x6, 0x2}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @gre_key=0x8, @gre_key}}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xffffffff, 0x8, 0x2}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @port=0x7fff, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv4=@multicast2, @ipv6=@remote, @icmp_id=0x68, @port=0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xffffff00, 'bpq0\x00', 'rose0\x00', {}, {}, 0x1, 0x1, 0x4}, 0x0, 0x108, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x22, 0x6, 0x0, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0xa, @local, @empty, @port=0x4e23, @port=0x4e22}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xac}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r3, 0x0, 0x10}, 0xc) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:57:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x600}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:53 executing program 4: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x68}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 605.547470][ T309] fuse: Unknown parameter 'rootmod\' [ 605.555366][ T318] fuse: Invalid rootmode 13:57:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x700}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x1000000) 13:57:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x119}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfff, 0x10000) write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) [ 605.967074][ T334] fuse: Invalid rootmode 13:57:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x11a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x900}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) [ 606.224795][ T350] fuse: Invalid rootmode 13:57:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x0, 0x2d0, 0x2d0, 0x1f0, 0xd0, 0x410, 0x410, 0x410, 0x410, 0x410, 0x5, &(0x7f0000000000), {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0xff000000, 'tunl0\x00', 'lo\x00', {}, {}, 0x6, 0x2}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @gre_key=0x8, @gre_key}}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xffffffff, 0x8, 0x2}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @port=0x7fff, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv4=@multicast2, @ipv6=@remote, @icmp_id=0x68, @port=0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xffffff00, 'bpq0\x00', 'rose0\x00', {}, {}, 0x1, 0x1, 0x4}, 0x0, 0x108, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x22, 0x6, 0x0, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0xa, @local, @empty, @port=0x4e23, @port=0x4e22}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xac}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r3, 0x0, 0x10}, 0xc) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:57:54 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x11b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 606.410377][ T360] fuse: Invalid rootmode 13:57:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1020}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:54 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x11c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80)={[{@lockproto_dlm='lockproto=dlm'}, {@nobarrier='nobarrier'}, {@locktable={'locktable', 0x3d, '/selinux/avc/cache_threshold\x00'}}]}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x12b78365c1aeba4b) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303006706f3b303030303030303034303030322c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:57:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2010}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 606.953832][ T488] fuse: Bad value for 'rootmode' 13:57:54 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x11d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:54 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\xff', 0x0, 0x0, 0x0) 13:57:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3f00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x0, 0x2d0, 0x2d0, 0x1f0, 0xd0, 0x410, 0x410, 0x410, 0x410, 0x410, 0x5, &(0x7f0000000000), {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0xff000000, 'tunl0\x00', 'lo\x00', {}, {}, 0x6, 0x2}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @gre_key=0x8, @gre_key}}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xffffffff, 0x8, 0x2}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @port=0x7fff, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv4=@multicast2, @ipv6=@remote, @icmp_id=0x68, @port=0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xffffff00, 'bpq0\x00', 'rose0\x00', {}, {}, 0x1, 0x1, 0x4}, 0x0, 0x108, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x22, 0x6, 0x0, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0xa, @local, @empty, @port=0x4e23, @port=0x4e22}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xac}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r3, 0x0, 0x10}, 0xc) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 607.296734][ T505] fuse: Invalid rootmode 13:57:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4800}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:55 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x11e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4c00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:55 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x11f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6800}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000000)={0x1, 0x0, {0x8, 0x40, 0xff, 0x80000000}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) 13:57:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x0, 0x2d0, 0x2d0, 0x1f0, 0xd0, 0x410, 0x410, 0x410, 0x410, 0x410, 0x5, &(0x7f0000000000), {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0xff000000, 'tunl0\x00', 'lo\x00', {}, {}, 0x6, 0x2}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @gre_key=0x8, @gre_key}}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xffffffff, 0x8, 0x2}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @port=0x7fff, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv4=@multicast2, @ipv6=@remote, @icmp_id=0x68, @port=0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xffffff00, 'bpq0\x00', 'rose0\x00', {}, {}, 0x1, 0x1, 0x4}, 0x0, 0x108, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x22, 0x6, 0x0, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0xa, @local, @empty, @port=0x4e23, @port=0x4e22}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xac}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r3, 0x0, 0x10}, 0xc) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:57:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6c00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:56 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x120}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:56 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x121}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 608.624222][ T572] fuse: Invalid rootmode 13:57:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7a00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xedc0}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 608.807115][ T580] fuse: Invalid rootmode 13:57:56 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x122}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 608.929627][ T585] fuse: Invalid rootmode 13:57:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xff00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:56 executing program 4 (fault-call:4 fault-nth:0): syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:57:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000000280)='./file0\x00', 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 609.120310][ T693] fuse: Invalid rootmode 13:57:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x0, 0x2d0, 0x2d0, 0x1f0, 0xd0, 0x410, 0x410, 0x410, 0x410, 0x410, 0x5, &(0x7f0000000000), {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0xff000000, 'tunl0\x00', 'lo\x00', {}, {}, 0x6, 0x2}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @gre_key=0x8, @gre_key}}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xffffffff, 0x8, 0x2}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @port=0x7fff, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv4=@multicast2, @ipv6=@remote, @icmp_id=0x68, @port=0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xffffff00, 'bpq0\x00', 'rose0\x00', {}, {}, 0x1, 0x1, 0x4}, 0x0, 0x108, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x22, 0x6, 0x0, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0xa, @local, @empty, @port=0x4e23, @port=0x4e22}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xac}, &(0x7f0000000180)=0xc) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:57:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:56 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x123}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x100000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 609.330112][ T703] FAULT_INJECTION: forcing a failure. [ 609.330112][ T703] name failslab, interval 1, probability 0, space 0, times 0 [ 609.379915][ T703] CPU: 0 PID: 703 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190814 #66 [ 609.388898][ T703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.389795][ T711] fuse: Invalid rootmode [ 609.399060][ T703] Call Trace: [ 609.399090][ T703] dump_stack+0x172/0x1f0 [ 609.399118][ T703] should_fail.cold+0xa/0x15 [ 609.399142][ T703] ? fault_create_debugfs_attr+0x180/0x180 [ 609.399167][ T703] ? ___might_sleep+0x163/0x280 [ 609.399192][ T703] __should_failslab+0x121/0x190 [ 609.399212][ T703] should_failslab+0x9/0x14 [ 609.399226][ T703] kmem_cache_alloc+0x2aa/0x710 [ 609.399242][ T703] ? __kasan_check_write+0x14/0x20 [ 609.399259][ T703] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 609.399284][ T703] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 609.456511][ T703] getname_flags+0xd6/0x5b0 [ 609.461039][ T703] user_path_at_empty+0x2f/0x50 [ 609.465902][ T703] path_getxattr+0xa0/0x170 [ 609.470410][ T703] ? ksys_write+0x1cf/0x290 [ 609.474915][ T703] ? getxattr+0x2d0/0x2d0 [ 609.479830][ T703] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 609.485304][ T703] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 609.490778][ T703] ? do_syscall_64+0x26/0x760 [ 609.495470][ T703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.501549][ T703] ? do_syscall_64+0x26/0x760 [ 609.506235][ T703] __x64_sys_lgetxattr+0x9a/0xf0 [ 609.511190][ T703] do_syscall_64+0xfa/0x760 [ 609.515707][ T703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.521604][ T703] RIP: 0033:0x459829 [ 609.525494][ T703] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.545100][ T703] RSP: 002b:00007f63b8b40c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 609.553503][ T703] RAX: ffffffffffffffda RBX: 00007f63b8b40c90 RCX: 0000000000459829 [ 609.561467][ T703] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000180 [ 609.569432][ T703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:57:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x200000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 609.577414][ T703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63b8b416d4 [ 609.585387][ T703] R13: 00000000004c5bb5 R14: 00000000004da3c8 R15: 0000000000000005 13:57:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 609.666866][ T721] fuse: Invalid rootmode 13:57:57 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x124}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:57 executing program 4 (fault-call:4 fault-nth:1): syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 609.807410][ T825] fuse: Invalid rootmode 13:57:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x800000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:57 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x125}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 609.967608][ T833] FAULT_INJECTION: forcing a failure. [ 609.967608][ T833] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 609.980868][ T833] CPU: 0 PID: 833 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190814 #66 [ 609.989820][ T833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.999900][ T833] Call Trace: [ 609.999930][ T833] dump_stack+0x172/0x1f0 [ 609.999958][ T833] should_fail.cold+0xa/0x15 [ 609.999977][ T833] ? __kasan_check_read+0x11/0x20 [ 609.999999][ T833] ? fault_create_debugfs_attr+0x180/0x180 [ 610.000024][ T833] ? __kasan_check_read+0x11/0x20 [ 610.012219][ T833] ? __lock_acquire+0x1703/0x4e70 [ 610.012244][ T833] should_fail_alloc_page+0x50/0x60 [ 610.012260][ T833] __alloc_pages_nodemask+0x1a1/0x900 [ 610.012282][ T833] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 610.023941][ T840] fuse: Invalid rootmode [ 610.028116][ T833] ? __alloc_pages_slowpath+0x2530/0x2530 [ 610.028135][ T833] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 610.028165][ T833] ? fault_create_debugfs_attr+0x180/0x180 [ 610.038393][ T833] cache_grow_begin+0x90/0xd20 [ 610.038417][ T833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 610.038436][ T833] kmem_cache_alloc+0x64e/0x710 [ 610.038451][ T833] ? __kasan_check_write+0x14/0x20 [ 610.038476][ T833] getname_flags+0xd6/0x5b0 [ 610.049466][ T833] user_path_at_empty+0x2f/0x50 [ 610.049488][ T833] path_getxattr+0xa0/0x170 [ 610.049505][ T833] ? ksys_write+0x1cf/0x290 [ 610.049520][ T833] ? getxattr+0x2d0/0x2d0 [ 610.049543][ T833] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 610.059495][ T833] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 610.059512][ T833] ? do_syscall_64+0x26/0x760 [ 610.059529][ T833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.059545][ T833] ? do_syscall_64+0x26/0x760 [ 610.059574][ T833] __x64_sys_lgetxattr+0x9a/0xf0 [ 610.071003][ T833] do_syscall_64+0xfa/0x760 [ 610.071026][ T833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.071040][ T833] RIP: 0033:0x459829 [ 610.071057][ T833] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.071066][ T833] RSP: 002b:00007f63b8b40c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 610.071089][ T833] RAX: ffffffffffffffda RBX: 00007f63b8b40c90 RCX: 0000000000459829 [ 610.082065][ T833] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000180 [ 610.082075][ T833] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:57:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x0, 0x2d0, 0x2d0, 0x1f0, 0xd0, 0x410, 0x410, 0x410, 0x410, 0x410, 0x5, &(0x7f0000000000), {[{{@ip={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0xff000000, 'tunl0\x00', 'lo\x00', {}, {}, 0x6, 0x2}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @gre_key=0x8, @gre_key}}}}, {{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xffffffff, 0x8, 0x2}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x10, @loopback, @dev={0xac, 0x14, 0x14, 0x14}, @port=0x7fff, @icmp_id=0x64}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv4=@multicast2, @ipv6=@remote, @icmp_id=0x68, @port=0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xff, 0xffffff00, 'bpq0\x00', 'rose0\x00', {}, {}, 0x1, 0x1, 0x4}, 0x0, 0x108, 0x140, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x22, 0x6, 0x0, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0xa, @local, @empty, @port=0x4e23, @port=0x4e22}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x508) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:57:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 610.082084][ T833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63b8b416d4 [ 610.082094][ T833] R13: 00000000004c5bb5 R14: 00000000004da3c8 R15: 0000000000000005 [ 610.401569][ T894] fuse: Invalid rootmode 13:57:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:58 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x126}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:58 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 610.708480][ T970] fuse: Invalid rootmode 13:57:58 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x127}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 610.975501][ T982] fuse: Invalid rootmode 13:57:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 611.101120][ T991] fuse: Invalid rootmode 13:57:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:57:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x5000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:58 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x128}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 611.307176][ T1000] fuse: Bad value for 'fd' [ 611.313326][ T1001] fuse: Invalid rootmode 13:57:59 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:57:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 611.548204][ T1012] fuse: Invalid rootmode [ 611.607684][ T1017] fuse: Bad value for 'fd' 13:57:59 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted/overlay.upper\x00', 0x0, 0x0) 13:57:59 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x129}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:57:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:59 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 611.761839][ T1024] fuse: Bad value for 'fd' 13:57:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 611.846882][ T1030] fuse: Invalid rootmode 13:57:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:57:59 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:57:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:57:59 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x12a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 612.210339][ T1043] fuse: Invalid rootmode 13:57:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x9000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 612.478197][ T1060] fuse: Invalid rootmode 13:58:00 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay/upper\x00', 0x0, 0x0) 13:58:00 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x12b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 612.708988][ T1075] fuse: Invalid rootmode 13:58:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:00 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x12c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x10000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 613.032342][ T1198] fuse: Invalid rootmode 13:58:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 613.278775][ T1217] fuse: Bad value for 'fd' 13:58:01 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x02', 0x0, 0x0) 13:58:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x20000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:01 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x12d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:01 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 613.652287][ T1332] fuse: Bad value for 'fd' [ 613.666683][ T1329] fuse: Invalid rootmode 13:58:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={0x1f, 0x0, "38ef9bfb8036244026f03cb80e4ea8d21c685218e069e1"}, &(0x7f0000000280), 0x400) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x20100000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:01 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:01 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 613.918858][ T1346] fuse: Invalid rootmode [ 613.986754][ T1352] fuse: Bad value for 'fd' 13:58:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3f000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:01 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:01 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x12e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 614.194205][ T1425] fuse: Invalid rootmode 13:58:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x40000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:02 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x12f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 614.507571][ T1484] fuse: Invalid rootmode 13:58:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x48000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 614.737278][ T1497] fuse: Invalid rootmode 13:58:02 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:02 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x130}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 614.999181][ T1616] fuse: Bad value for 'fd' 13:58:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4c000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:02 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x131}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 615.122187][ T1624] fuse: Invalid rootmode [ 615.221244][ T1635] fuse: Bad value for 'fd' 13:58:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x60000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 615.387824][ T1645] fuse: Bad value for 'fd' [ 615.394870][ T1644] fuse: Invalid rootmode 13:58:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x68000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 615.626487][ T1664] fuse: Invalid rootmode 13:58:03 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:03 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x132}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6c000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 615.921831][ T1761] fuse: Invalid rootmode 13:58:03 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x133}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x74000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 616.182702][ T1794] fuse: Invalid rootmode 13:58:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7a000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 616.426460][ T1812] fuse: Invalid rootmode 13:58:04 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:04 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x134}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8cffffff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 616.868414][ T1929] fuse: Invalid rootmode 13:58:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc0ed0000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 617.168889][ T1951] fuse: Invalid rootmode 13:58:04 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x135}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ef5a811b0f48eaf449c732f90620d0007f454879ebfacb945878d5a91cf63c8d8cb239e2e60e5cfed6bda986079d390bc8558a5d206849df93ab23") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf6ffffff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 617.382698][ T1962] fuse: Invalid rootmode [ 617.403471][ T1962] fuse: Invalid rootmode 13:58:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf9fdffff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:05 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x136}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:05 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\xff', 0x0, 0x0) 13:58:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 617.711604][ T1976] fuse: Missing mount parameter(s) [ 617.731471][ T1979] fuse: Invalid rootmode 13:58:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xff000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:05 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x137}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 617.936647][ T2093] fuse: Missing mount parameter(s) [ 617.951285][ T2094] fuse: Invalid rootmode 13:58:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xfffffdf9}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:05 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x138}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 618.160360][ T2106] fuse: Invalid rootmode [ 618.177269][ T2108] fuse: Missing mount parameter(s) 13:58:06 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xffffff8c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 618.584542][ T2223] fuse: Bad value for 'fd' [ 618.623034][ T2222] fuse: Invalid rootmode 13:58:06 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\xff', 0x0, 0x0) 13:58:06 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x139}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xfffffff6}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 618.808639][ T2234] fuse: Invalid rootmode 13:58:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xedc000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 618.858653][ T2238] fuse: Bad value for 'fd' 13:58:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 618.990888][ T2245] fuse: Bad value for 'rootmode' [ 619.020084][ T2245] fuse: Bad value for 'rootmode' 13:58:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x10000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 619.070283][ T2250] fuse: Bad value for 'fd' 13:58:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 619.227624][ T2299] fuse: Invalid rootmode [ 619.260853][ T2325] fuse: Bad value for 'rootmode' 13:58:07 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:07 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x13a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x2}) 13:58:07 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x8c', 0x0, 0x0) 13:58:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x20000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:07 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:07 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x13b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x3}) [ 619.745554][ T2481] fuse: Invalid rootmode [ 619.763583][ T2477] fuse: Bad value for 'rootmode' 13:58:07 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x13c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:07 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x40000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 620.038886][ T2503] fuse: Invalid rootmode 13:58:07 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 620.085454][ T2505] fuse: Bad value for 'rootmode' 13:58:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:08 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\xf6', 0x0, 0x0) 13:58:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x80000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:08 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:08 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x13d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x4}) 13:58:08 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 620.746515][ T2636] fuse: Bad value for 'rootmode' 13:58:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x100000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:08 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x13e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 620.987186][ T2757] fuse: Bad value for 'rootmode' 13:58:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x5}) 13:58:08 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 621.031825][ T2757] fuse: Bad value for 'rootmode' [ 621.196082][ T2772] fuse: Bad value for 'fd' 13:58:09 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:09 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x13f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:09 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x200000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 13:58:09 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x6}) [ 621.806553][ T2889] fuse: Bad value for 'fd' [ 621.837414][ T2887] fuse: Bad value for 'rootmode' 13:58:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 13:58:09 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x300000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:09 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x140}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:09 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x7}) 13:58:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) [ 622.109916][ T3003] fuse: Bad value for 'rootmode' [ 622.122063][ T3008] fuse: Bad value for 'fd' 13:58:10 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:10 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:10 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x141}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x8}) [ 622.763150][ T3144] fuse: Bad value for 'rootmode' 13:58:10 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x500000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:10 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x142}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0xa}) 13:58:10 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 623.100356][ T3300] fuse: Bad value for 'rootmode' 13:58:11 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:11 executing program 3: 13:58:11 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x143}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x600000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0xb}) 13:58:11 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 623.683409][ T3431] fuse: Bad value for 'rootmode' 13:58:11 executing program 3: 13:58:11 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x700000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:11 executing program 3: [ 623.958439][ T3453] fuse: Bad value for 'rootmode' [ 624.029221][ T3453] fuse: Bad value for 'rootmode' 13:58:11 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x144}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:11 executing program 3: remap_file_pages(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x0, 0x0, 0x0) 13:58:12 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x800000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:12 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") syz_open_procfs(0x0, &(0x7f0000000280)='net/dev_sn^\xd2\xd2\x84\\6\xe3E\xb5\x15d\xfa\xaf\xab\xbbf\x99\xb8\xddZ\xc3\xdck\xa2\x88\xc0wu\x86r#\x8f\xf9qf~\xa6\xdf3O\x1d\x19\x9d \xd8`\xd7p-\xb5\x95\xd5\x885tZ\xd1\x034|\x15\x89\xec\r_95\xa4\xda\x15US\x05l\xc2\x94 \xc9\x814\xc7\x97\aR\xbc\x0e\xed\xb7+2\x19\xb7=\xe7\r.\x89\x9e\xc4\x9cpcC\xdfj~4\xcc2\xc7\xc3\v\xca\x05\x80\xc7*\xc9\x11m\x86#\xaeTQ\xf0a\xbb\xa2\x03y0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0xc}) [ 624.620763][ T3480] fuse: Bad value for 'rootmode' 13:58:12 executing program 3: ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) close(r0) 13:58:12 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x146}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:12 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x900000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:12 executing program 3: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x134}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 624.893696][ T3574] fuse: Missing mount parameter(s) 13:58:12 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 624.999131][ T3606] fuse: Bad value for 'rootmode' [ 625.148403][ T3615] fuse: Missing mount parameter(s) 13:58:13 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0xd}) 13:58:13 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x147}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay/upper\x00', 0x0, 0x0) 13:58:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 625.570469][ T3628] fuse: Missing mount parameter(s) [ 625.596591][ T3630] fuse: Bad value for 'rootmode' 13:58:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 625.828985][ T3641] fuse: Bad value for 'fd' 13:58:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 625.858739][ T3642] fuse: Bad value for 'rootmode' 13:58:13 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x148}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 626.060861][ T3650] fuse: Bad value for 'fd' 13:58:13 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 626.086924][ T3652] fuse: Bad value for 'rootmode' [ 626.254620][ T3659] fuse: Bad value for 'fd' 13:58:14 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x2) 13:58:14 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x149}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2010000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0xf}) 13:58:14 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 626.533403][ T3672] fuse: Invalid rootmode [ 626.561620][ T3671] fuse: Bad value for 'rootmode' 13:58:14 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) 13:58:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3f00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 626.742236][ T3682] fuse: Invalid rootmode 13:58:14 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=""/110, 0x6e) [ 626.851570][ T3687] fuse: Bad value for 'rootmode' 13:58:14 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x14a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 626.968642][ T3692] fuse: Invalid rootmode [ 627.144060][ T3699] fuse: Bad value for 'rootmode' [ 627.173470][ T3699] fuse: Bad value for 'rootmode' 13:58:15 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x4000) 13:58:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:15 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, &(0x7f0000000400)=""/110, 0x6e) 13:58:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4800000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:15 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x14b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x10}) [ 627.497971][ T3721] fuse: Bad value for 'rootmode' 13:58:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4c00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:15 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, &(0x7f0000000400)=""/110, 0x6e) 13:58:15 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x14c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x13}) 13:58:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 627.891068][ T3918] fuse: Bad value for 'rootmode' 13:58:15 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, &(0x7f0000000400)=""/110, 0x6e) 13:58:16 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x1000000) 13:58:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:16 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x14d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x14}) 13:58:16 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 628.412977][ T3967] fuse: Bad value for 'rootmode' 13:58:16 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x14e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6800000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x15}) 13:58:16 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x14f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 628.776529][ T4088] fuse: Bad value for 'rootmode' 13:58:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 628.934121][ T4095] fuse: Bad value for 'fd' 13:58:17 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x2000000) 13:58:17 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6c00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:17 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x150}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x16}) 13:58:17 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 629.395663][ T4212] fuse: Bad value for 'fd' [ 629.417004][ T4209] fuse: Bad value for 'rootmode' 13:58:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:17 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x151}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 629.469614][ T4209] fuse: Bad value for 'rootmode' 13:58:17 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7400000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x18}) [ 629.625487][ T4324] fuse: Bad value for 'fd' 13:58:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 629.714012][ T4328] fuse: Bad value for 'rootmode' 13:58:17 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7a00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 630.009062][ T4442] fuse: Bad value for 'rootmode' 13:58:18 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x40000000) 13:58:18 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x152}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1b}) 13:58:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8cffffff00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:18 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 630.392262][ T4454] fuse: Bad value for 'rootmode' 13:58:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf6ffffff00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 630.640037][ T4469] fuse: Bad value for 'rootmode' 13:58:18 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf9fdffff00000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:18 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x153}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 630.864497][ T4479] fuse: Bad value for 'rootmode' 13:58:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x8cffffff) 13:58:19 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xff00000000000000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:19 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x154}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1e}) 13:58:19 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 631.402738][ T4501] fuse: Bad value for 'rootmode' 13:58:19 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:19 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x7, {'user_id'}, 0x2c, {'group_id'}}) 13:58:19 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x155}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x23}) [ 631.657663][ T4614] fuse: Bad value for 'rootmode' 13:58:19 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:19 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x156}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0xf6ffffff) 13:58:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2e, {'user_id'}, 0x2c, {'group_id'}}) 13:58:20 executing program 3: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:20 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:20 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x157}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0xfdd}) [ 632.396941][ T4641] device eql entered promiscuous mode [ 632.426099][ T4644] fuse: Bad value for 'rootmode' 13:58:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x3c, {'user_id'}, 0x2c, {'group_id'}}) 13:58:20 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x158}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 632.688005][ T4657] fuse: Bad value for 'rootmode' [ 632.691292][ T4641] device eql entered promiscuous mode 13:58:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'\nser_id'}, 0x2c, {'group_id'}}) 13:58:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 632.929619][ T4667] fuse: Invalid rootmode 13:58:20 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0xffffff8c) 13:58:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'#ser_id'}, 0x2c, {'group_id'}}) 13:58:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x6a00}) 13:58:20 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x159}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:20 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 633.367016][ T4682] fuse: Bad value for 'fd' [ 633.380778][ T4687] fuse: Invalid rootmode 13:58:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'%ser_id'}, 0x2c, {'group_id'}}) 13:58:21 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x15a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 633.580497][ T4798] fuse: Bad value for 'fd' 13:58:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x6b00}) 13:58:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 633.669090][ T4801] fuse: Invalid rootmode 13:58:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'*ser_id'}, 0x2c, {'group_id'}}) [ 633.835236][ T4810] device eql entered promiscuous mode [ 633.882985][ T4815] fuse: Bad value for 'fd' [ 633.909924][ T4817] fuse: Invalid rootmode 13:58:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0xfffffff6) 13:58:21 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x15b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'+ser_id'}, 0x2c, {'group_id'}}) 13:58:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x6c00}) 13:58:21 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'-ser_id'}, 0x2c, {'group_id'}}) 13:58:22 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x15c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0xff00}) 13:58:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 634.751490][ T5050] fuse: Invalid rootmode [ 634.812035][ T5055] device eql entered promiscuous mode 13:58:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x100000000000000) 13:58:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:22 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x15d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'.ser_id'}, 0x2c, {'group_id'}}) 13:58:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x3fffffff}) [ 635.295680][ T5170] fuse: Bad value for 'fd' 13:58:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 635.318787][ T5174] fuse: Invalid rootmode [ 635.332845][ T5175] device eql entered promiscuous mode 13:58:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'0ser_id'}, 0x2c, {'group_id'}}) 13:58:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 635.522615][ T5186] fuse: Invalid rootmode 13:58:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'Xser_id'}, 0x2c, {'group_id'}}) [ 635.591602][ T5191] fuse: Bad value for 'fd' 13:58:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 635.816804][ T5238] fuse: Bad value for 'fd' [ 635.878841][ T5256] fuse: Invalid rootmode 13:58:23 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:23 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x15e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:23 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'\\ser_id'}, 0x2c, {'group_id'}}) 13:58:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x200000000000000) 13:58:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100, 0x101000) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040)={0x2, 0x5, 0x43, 0x7}, 0x8) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 636.251458][ T5317] fuse: Invalid rootmode 13:58:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'cser_id'}, 0x2c, {'group_id'}}) 13:58:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 636.551507][ T5335] fuse: Invalid rootmode [ 636.551622][ T5336] fuse: Missing mount parameter(s) 13:58:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'dser_id'}, 0x2c, {'group_id'}}) 13:58:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:24 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x15f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 636.771826][ T5345] fuse: Invalid rootmode 13:58:24 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'iser_id'}, 0x2c, {'group_id'}}) [ 636.919490][ T5452] fuse: Missing mount parameter(s) 13:58:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x02', 0x20}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x312) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x9, 0x2000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000240)={@mcast2, @ipv4={[], [], @multicast2}, @dev={0xfe, 0x80, [], 0x1a}, 0x9, 0x1, 0x0, 0x100, 0x100, 0x1, r3}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x80, 0x7}]}) [ 637.074269][ T5459] fuse: Invalid rootmode 13:58:24 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x4000000000000000) 13:58:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:24 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x160}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:24 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:24 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'lser_id'}, 0x2c, {'group_id'}}) 13:58:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0xfff) [ 637.319912][ T5571] fuse: Missing mount parameter(s) [ 637.408071][ T5577] fuse: Invalid rootmode 13:58:25 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:25 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x161}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'oser_id'}, 0x2c, {'group_id'}}) [ 637.653912][ T5591] fuse: Bad value for 'fd' [ 637.699301][ T5597] fuse: Invalid rootmode 13:58:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'pser_id'}, 0x2c, {'group_id'}}) 13:58:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 637.838798][ T5604] fuse: Invalid rootmode [ 637.972771][ T5608] fuse: Bad value for 'fd' 13:58:25 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x8cffffff00000000) 13:58:25 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'sser_id'}, 0x2c, {'group_id'}}) 13:58:25 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x162}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x83) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000580)) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f00000000c0)={0x6, 0x2, 0x800015f, 0x7ea, 0x0, 0xbc, 0x1}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 638.329057][ T5619] fuse: Invalid rootmode [ 638.335986][ T5620] fuse: Bad value for 'fd' 13:58:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:26 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x163}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'xser_id'}, 0x2c, {'group_id'}}) 13:58:26 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 638.590895][ T5635] fuse: Invalid rootmode 13:58:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 638.665086][ T5640] fuse: Invalid rootmode 13:58:26 executing program 1: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 638.814683][ T5647] fuse: Invalid rootmode 13:58:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0xf6ffffff00000000) 13:58:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u\ner_id'}, 0x2c, {'group_id'}}) 13:58:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:26 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:26 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x164}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0801ff14850300003c00000000000000000000001aa3b256154799e933d34b3160b64bfb9690c2c46517e1fad67a1ba481fccd81b885ba05c4a0e6f7f8ab871e662fe7669b639a0e3e37f1c46bccd8f51f0599256ed7fa6a631143a1d3a87c820bd5d750ac63db2c33555aae3cd9bcb88376dff255ca73a94bb3e79d32d69b7d69a570c8a5856ba444f202333ee78ddcd69e36d62772637f1ad9b71af0e7a61875408805c07b81bd9ebdb36fc54f8502facf6d0700"/448], 0x1c0) [ 639.299022][ T5763] fuse: Invalid rootmode [ 639.314880][ T5764] fuse: Invalid rootmode 13:58:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u#er_id'}, 0x2c, {'group_id'}}) 13:58:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 639.576827][ T5779] fuse: Invalid rootmode 13:58:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u%er_id'}, 0x2c, {'group_id'}}) 13:58:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 639.896912][ T5791] fuse: Invalid rootmode 13:58:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x4, 0x3ff, 0xc90}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:27 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x165}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x5, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u*er_id'}, 0x2c, {'group_id'}}) 13:58:27 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80800, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\"\x00', 0x8000}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e8020000e800000000000000e800000000000000e8000000500200005002000050020000500200005002000003000000", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000a41588bf70227999e78709aa1fe93d33c11725bbb88fec8b291240f83c53d957f3bcdf3be68f4e64fbd0da48b72f67b66cc51d8802804e2a418e57b21a25ca5a313bff0e4231f974c71bbcade482418331402e0e918966d4bd8e18b9471ab2369cf5951220c2c6aeba6d74c3abd946e85e"], @ANYBLOB="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"], 0x348) [ 640.210806][ T5803] fuse: Bad value for 'fd' [ 640.244011][ T5806] fuse: Invalid rootmode 13:58:28 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u+er_id'}, 0x2c, {'group_id'}}) 13:58:28 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x166}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 13:58:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 640.533222][ T5922] fuse: Invalid rootmode [ 640.554037][ T5921] fuse: Bad value for 'fd' 13:58:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u-er_id'}, 0x2c, {'group_id'}}) [ 640.801054][ T5989] fuse: Invalid rootmode 13:58:28 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)='/dev/fuse\x00', 0xffffffffffffffff}, 0x30) gettid() r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000480)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x100000002, &(0x7f0000000580)=ANY=[@ANYBLOB="66613d4899a9a496290612f82745db26dc59b57dbaf0aa55d5e7f6f7dfae85072eee7cb647f7c22211ccffe419b165aba9a8fbb9de6732653052b3bd57e1ef6b", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=r3, @ANYBLOB='*group[id=', @ANYRESDEC=0x0, @ANYBLOB=',mask=MAY_WRITE,smackfsdef=cgroupself.,\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000400)={0x4, &(0x7f0000000380)=[{}, {}, {}, {0x0}]}) getsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000140), &(0x7f0000000500)=0x4) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000440)={r4, 0x1}) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000540)={@multicast2, @rand_addr=0x1}, 0x8) 13:58:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u.er_id'}, 0x2c, {'group_id'}}) 13:58:28 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 13:58:28 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x167}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 641.222286][ T6048] fuse: Invalid rootmode [ 641.230482][ T6054] fuse: Bad value for 'fd' 13:58:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 13:58:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u0er_id'}, 0x2c, {'group_id'}}) 13:58:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x1d3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 641.540401][ T6070] fuse: Invalid rootmode 13:58:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x2, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uXer_id'}, 0x2c, {'group_id'}}) 13:58:29 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x168}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) 13:58:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 641.977400][ T6091] fuse: Invalid rootmode 13:58:29 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'u\\er_id'}, 0x2c, {'group_id'}}) 13:58:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) 13:58:29 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x169}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 642.351451][ T6107] fuse: Invalid rootmode 13:58:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000340)={0x1, 0x5, 0x1000, 0x12, &(0x7f0000000000)="48c7aecc8d5ec1718ad12bc71e10cb1010d5", 0x45, 0x0, &(0x7f0000000200)="6b4d122b3cd689b886cf67c3286acb36bce29158282b5fbee33ff69a316a014ee8b7f65832fdd68cbc502e6b0f1066850650007d7a5d29c8993c7a70e65464b81fcf665dec"}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:30 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'ucer_id'}, 0x2c, {'group_id'}}) 13:58:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, &(0x7f0000000400)=""/110, 0x6e) [ 642.657330][ T6222] fuse: Invalid rootmode 13:58:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:30 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uder_id'}, 0x2c, {'group_id'}}) 13:58:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000380)=""/150, &(0x7f0000000340)=0x9042fa77c302c063) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x2, 0x4) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:30 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x16a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:30 executing program 3: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x169}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 642.994945][ T6238] fuse: Invalid rootmode [ 643.042165][ T6240] fuse: Invalid rootmode 13:58:30 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:30 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uier_id'}, 0x2c, {'group_id'}}) [ 643.240258][ T6256] fuse: Missing mount parameter(s) 13:58:31 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 643.299180][ T6259] fuse: Invalid rootmode [ 643.419219][ T6291] fuse: Missing mount parameter(s) 13:58:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) recvfrom(r0, &(0x7f0000000200)=""/165, 0xa5, 0x20, &(0x7f0000000000)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(morus640-generic)\x00'}, 0x80) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uler_id'}, 0x2c, {'group_id'}}) 13:58:31 executing program 3 (fault-call:4 fault-nth:0): syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:31 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x16b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:31 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20ncci\x00', 0x800, 0x0) bind$isdn_base(r3, &(0x7f0000000780)={0x22, 0x1, 0x92, 0x101, 0x688}, 0x6) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0x7fffffff) syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x1b579b47, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x1, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x100, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000440)=[&(0x7f0000000380)='/dev/btrfs-control\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='eql\x00']) r6 = accept4$llc(r5, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x10, 0x80800) clock_gettime(0x7, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000480)=0xffffffffffffffff, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)=0x0) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000500)=r7) [ 643.716260][ T6375] fuse: Invalid rootmode [ 643.726951][ T6376] FAULT_INJECTION: forcing a failure. [ 643.726951][ T6376] name failslab, interval 1, probability 0, space 0, times 0 [ 643.735554][ T6378] fuse: Missing mount parameter(s) [ 643.771831][ T6376] CPU: 0 PID: 6376 Comm: syz-executor.3 Not tainted 5.3.0-rc4-next-20190814 #66 [ 643.780902][ T6376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.790966][ T6376] Call Trace: [ 643.794273][ T6376] dump_stack+0x172/0x1f0 [ 643.798659][ T6376] should_fail.cold+0xa/0x15 [ 643.803262][ T6376] ? fault_create_debugfs_attr+0x180/0x180 [ 643.809079][ T6376] ? ___might_sleep+0x163/0x280 [ 643.813947][ T6376] __should_failslab+0x121/0x190 [ 643.818896][ T6376] should_failslab+0x9/0x14 [ 643.823408][ T6376] kmem_cache_alloc_trace+0x2d3/0x790 [ 643.828801][ T6376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.835058][ T6376] fuse_dev_do_write+0xb31/0x2540 [ 643.840086][ T6376] ? __kasan_check_read+0x11/0x20 [ 643.845114][ T6376] ? mark_lock+0xc2/0x1220 [ 643.849540][ T6376] ? fuse_dev_read+0x200/0x200 [ 643.854309][ T6376] ? __kasan_check_read+0x11/0x20 [ 643.859341][ T6376] ? __lock_acquire+0x1703/0x4e70 [ 643.864374][ T6376] ? aa_file_perm+0x40b/0xdd0 [ 643.869055][ T6376] ? find_held_lock+0x35/0x130 [ 643.873842][ T6376] ? aa_file_perm+0x40b/0xdd0 [ 643.878538][ T6376] ? lock_downgrade+0x920/0x920 [ 643.883400][ T6376] ? memset+0x32/0x40 [ 643.883425][ T6376] fuse_dev_write+0x15c/0x1f0 [ 643.883443][ T6376] ? fuse_dev_splice_write+0xae0/0xae0 [ 643.883459][ T6376] ? aa_file_perm+0x432/0xdd0 [ 643.883473][ T6376] ? kstrtouint+0x142/0x1a0 [ 643.883497][ T6376] ? aa_path_link+0x340/0x340 [ 643.892242][ T6376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.892260][ T6376] ? iov_iter_init+0xee/0x210 [ 643.892282][ T6376] new_sync_write+0x4d3/0x770 [ 643.902412][ T6376] ? new_sync_read+0x800/0x800 [ 643.902438][ T6376] ? common_file_perm+0x238/0x720 [ 643.902453][ T6376] ? __fget+0x384/0x560 [ 643.902475][ T6376] ? apparmor_file_permission+0x25/0x30 [ 643.902492][ T6376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.902516][ T6376] ? security_file_permission+0x8f/0x380 [ 643.927280][ T6376] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 643.927303][ T6376] __vfs_write+0xe1/0x110 [ 643.927329][ T6376] vfs_write+0x268/0x5d0 [ 643.941263][ T6376] ksys_write+0x14f/0x290 [ 643.941283][ T6376] ? __ia32_sys_read+0xb0/0xb0 [ 643.941312][ T6376] ? do_syscall_64+0x26/0x760 [ 643.986243][ T6376] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.992318][ T6376] ? do_syscall_64+0x26/0x760 [ 643.997005][ T6376] __x64_sys_write+0x73/0xb0 [ 644.001613][ T6376] do_syscall_64+0xfa/0x760 [ 644.006138][ T6376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.012025][ T6376] RIP: 0033:0x459829 [ 644.015920][ T6376] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.015929][ T6376] RSP: 002b:00007f3193d3fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 644.015943][ T6376] RAX: ffffffffffffffda RBX: 00007f3193d3fc90 RCX: 0000000000459829 [ 644.015952][ T6376] RDX: 000000000000002e RSI: 0000000020000000 RDI: 0000000000000004 [ 644.015961][ T6376] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:58:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uoer_id'}, 0x2c, {'group_id'}}) 13:58:31 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x16c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:31 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:31 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/83, 0x53) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 644.015970][ T6376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3193d406d4 [ 644.015987][ T6376] R13: 00000000004c92c3 R14: 00000000004e05f0 R15: 0000000000000005 [ 644.166581][ T6393] fuse: Invalid rootmode [ 644.173213][ T6391] fuse: Bad value for 'fd' 13:58:31 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uper_id'}, 0x2c, {'group_id'}}) 13:58:31 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:32 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x16d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:32 executing program 3 (fault-call:4 fault-nth:1): syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 644.449411][ T6464] fuse: Invalid rootmode [ 644.518282][ T6509] fuse: Bad value for 'fd' 13:58:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uuer_id'}, 0x2c, {'group_id'}}) 13:58:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x2) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000580)={"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"}) 13:58:32 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:32 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x16e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 644.725765][ T6520] fuse: Invalid rootmode 13:58:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uxer_id'}, 0x2c, {'group_id'}}) [ 644.832284][ T6568] fuse: Bad value for 'fd' 13:58:32 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 644.942884][ T6643] fuse: Invalid rootmode [ 644.994046][ T6646] fuse: Invalid rootmode 13:58:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x102) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) syz_open_procfs(r2, &(0x7f0000000240)='net/raw\x00') 13:58:32 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x16f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x8dd151a74cb7dba0}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:32 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'us\nr_id'}, 0x2c, {'group_id'}}) 13:58:32 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:32 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x170}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 645.235117][ T6661] fuse: Invalid rootmode [ 645.277017][ T6668] fuse: Invalid rootmode 13:58:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0xf, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:33 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'us%r_id'}, 0x2c, {'group_id'}}) 13:58:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:33 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x171}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 645.545443][ T6783] fuse: Invalid rootmode [ 645.581568][ T6789] fuse: Invalid rootmode 13:58:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2000002e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:33 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:33 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, 0x0, 0x0) 13:58:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'us\\r_id'}, 0x2c, {'group_id'}}) 13:58:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x63e, 0x200, 0x0]}, &(0x7f0000000040)=0xa) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:33 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x172}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x2, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 646.103766][ T6912] fuse: Invalid rootmode 13:58:33 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, 0x0, 0x0) 13:58:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'uswr_id'}, 0x2c, {'group_id'}}) 13:58:33 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x173}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x3, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, 0x0, 0x0) 13:58:34 executing program 2: clone(0xa0800000, &(0x7f0000000240)="3242f6c9c5ba8efbc9e44a002e846a41d2c2b9e4522e3b8ba0cf6f5c8f72198fabe9f6b321f5fc32d80dcaa6824dc51c93ec5585f9139e0f800f71cea992c5aa6638196c834983852fcee664ec812adccc4eb1bbbbf60a3386bb7c0444c2f0029fa9eb834f4217961921f9bb3e5ece98d403b9b9e580addedb7492e9cbfd6223560cc3fe764f296223c6e757acf88fb12d", &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)="17009251faed99b7c29e2d01b43dd8369b37c0ae601589f301e8c226a55dba36534f7c9dd91fe525a95a3c") r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) r1 = userfaultfd(0x80800) splice(r0, &(0x7f0000000080), r1, &(0x7f00000000c0), 0xffff, 0xc) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000300)='./file0\x00', r2, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'eql\x00', 0x200}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x20) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x4) ioctl$sock_ifreq(r4, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000004c0)={0x9d0000, 0x6, 0x6, [], &(0x7f0000000480)={0xa00966, 0x7, [], @value=0x7ff}}) [ 646.441450][ T7040] fuse: Invalid rootmode 13:58:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='projid_map\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0, 0xffffffff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x4) 13:58:34 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x174}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x4, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'use\n_id'}, 0x2c, {'group_id'}}) 13:58:34 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(0x0, 0x0, 0x0) 13:58:34 executing program 2: syslog(0x6873fe7a, &(0x7f0000000000)=""/50, 0x32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x307) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40000, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 647.017929][ T7162] fuse: Invalid rootmode 13:58:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20ncci\x00', 0x800, 0x0) bind$isdn_base(r3, &(0x7f0000000780)={0x22, 0x1, 0x92, 0x101, 0x688}, 0x6) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0x7fffffff) syz_open_dev$dmmidi(&(0x7f00000005c0)='/dev/dmmidi#\x00', 0x1b579b47, 0x2) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x1, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x100, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)='\x00'], &(0x7f0000000440)=[&(0x7f0000000380)='/dev/btrfs-control\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='eql\x00']) r6 = accept4$llc(r5, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x10, 0x80800) clock_gettime(0x7, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000480)=0xffffffffffffffff, 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)=0x0) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000500)=r7) 13:58:34 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x175}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x5, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'use\\_id'}, 0x2c, {'group_id'}}) 13:58:34 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000040)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000400)="058396eb0caa080f9470030abae7a7ffb7efffc12cb21fee1ed0dd05a98813f75ef820ab1754a4cc5570356f1a8372ca3ef24bb6990f84b045a41c5b0ec89853e7642f7dc11214956915a70ac19a1ea4db5681e3fea1aed8e51dc773f7f18367f832c3fae8fb137f671e7247cac911be392b6c65275d1a97bc1e8317cb6ecca66dc03c58172afdce77be3c473d857ec5f666078e351e99348e956c5d026cde3f0c7a363f1772eda87536d9c7bd08b238cfb395ed092641439ebc8b2a88cbeefedcbfa844c825f247083af7da8ccc70277afbb20d17e7e3bd7a71478a95e79fdad9b505fbb0c2140cd875afd0a1526e87a0", 0xf1, 0x24000040, 0x0, 0x0) [ 647.360779][ T7189] fuse: Invalid rootmode 13:58:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="d5f1a489910f182a2166643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67010075705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000800)=[&(0x7f0000000480)='/dev/video35\x00', &(0x7f00000004c0)='trusted.overlay.upper\x00', &(0x7f0000000640)='ppp1vmnet1\x00', &(0x7f0000000680)='posix_acl_access]\x00', &(0x7f00000006c0)='vboxnet1\x00', &(0x7f0000000700)='mountinfo\x00', &(0x7f0000000740)='{[trustedbdev\x00', &(0x7f0000000780)='!/\\\x00', &(0x7f00000007c0)='lo]cpuset$\x00'], &(0x7f0000000a00)=[&(0x7f0000000880)='*em1\x00', &(0x7f00000008c0)='user-+,\x00', &(0x7f0000000900)='fuse.', &(0x7f0000000940)='fuse.', &(0x7f0000000980)='@lo\x00', &(0x7f00000009c0)='mountinfo\x00']) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000400)={0xb, 0x400, 0x9, 0x800, r0}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="889d236872c43a089421fb839437f1d42f48fd6b1970d097bf6cc574954bb7fde68cab8fc10a10755162d1dbb36b8cbf3658e4745f64a0b36a57bf4139ea0f4aeaab032bca3931d4e6b6b48dbcfb7f1030196cc2d341ff55dce666f06f3f23293d1efd1c1df22e99f6a6ad6588c14ba83e72c4aa785ca6125633eb11ed08f46e0b709116f5a97dcf4ba76c17ad04bb1faabca5217eb5039b793e54a04cbdb023c873eecbca306d91bb46309914c78a86388b8e0ab619a7d98b4fa7e48549b6384926e70fe3da3963acc7736119fb7388ad8ad3d20911c446aba3900aff12dbb0cd5db86734ec1d64008ce36305ef4b", @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRESDEC=r0], &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300)={0x0, 0x9}, &(0x7f0000000340)=0x8) accept4$packet(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x14, 0x800) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000a40)=ANY=[@ANYBLOB="73797a3038224d5a08e5552347d50c121a39aa88d497cdb5fd489b6d413f7001ea8e11b6fe08423247de67341b0976add9bbb7edeb50305c4ede580fe0d07fafa8331f13498c3935f63c48bf7b7b6dc6af48cde034d1868ef2745a60b3309ccf0d6c0c67a524ad180b08d044fc86eb7ddc7d08ac3a1a0eae2156b39a3193b9435ce6fc"], 0x77) 13:58:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0xf0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_\nd'}, 0x2c, {'group_id'}}) 13:58:35 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x176}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 647.619317][ T7206] fuse: Invalid rootmode [ 647.666227][ T7239] fuse: Unknown parameter '񤉑*!fd' 13:58:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x4000, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 647.721603][ T7239] fuse: Unknown parameter '񤉑*!fd' 13:58:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_%d'}, 0x2c, {'group_id'}}) [ 647.902219][ T7325] fuse: Invalid rootmode 13:58:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x893f, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:35 executing program 1 (fault-call:4 fault-nth:0): syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)) 13:58:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0xf000, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_\\d'}, 0x2c, {'group_id'}}) 13:58:35 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x177}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 648.172774][ T7338] fuse: Invalid rootmode 13:58:35 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_i\n'}, 0x2c, {'group_id'}}) 13:58:36 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x178}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 648.290496][ T7348] FAULT_INJECTION: forcing a failure. [ 648.290496][ T7348] name failslab, interval 1, probability 0, space 0, times 0 [ 648.320726][ T7348] CPU: 0 PID: 7348 Comm: syz-executor.1 Not tainted 5.3.0-rc4-next-20190814 #66 [ 648.329873][ T7348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:58:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') inotify_init1(0x800) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)={0x33c, r2, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x48, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd0}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4, 0xb9, @loopback, 0xfffffffffffffff7}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xff, @remote, 0x51f9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0xfffffffffffeffff}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0xe}, 0xffffffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}, {0x14, 0x2, @in={0x2, 0x4, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x5da7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff8}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8ec8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x64, @mcast1, 0x9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x2c7}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}]}]}, 0x33c}, 0x1, 0x0, 0x0, 0x4000040}, 0x800) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 648.329881][ T7348] Call Trace: [ 648.329910][ T7348] dump_stack+0x172/0x1f0 [ 648.329938][ T7348] should_fail.cold+0xa/0x15 [ 648.352193][ T7348] ? fault_create_debugfs_attr+0x180/0x180 [ 648.358031][ T7348] ? ___might_sleep+0x163/0x280 [ 648.362972][ T7348] __should_failslab+0x121/0x190 [ 648.362994][ T7348] should_failslab+0x9/0x14 [ 648.363009][ T7348] kmem_cache_alloc+0x2aa/0x710 [ 648.363028][ T7348] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 648.363052][ T7348] ? rcu_read_lock_bh_held+0xb0/0xb0 13:58:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) openat$userio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/userio\x00', 0x220000, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) sysfs$2(0x2, 0x4, &(0x7f00000004c0)=""/117) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000000c0)={{0x1, 0x5, 0x400, 0x7, 0x7, 0x4189}, 0x27, 0x9, 0xfffffffffffffff9, 0x1ff, 0xfffffffeffffffff, "fc2b4ce32d37efd20eda4cf090aec8c55ebf67b7ebae74c271075faa7bfeb0cc2bcb4c461e6ca29c70469583aa27a29290168b20efa1153c4dfc2e2e970c3101040000000000004d37e08031e83c5fb9f2ff3ec81bf4ed26dce7ecb822ca15ece93ec43def293590b417d3a4fe0852e7851470630700"}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'vxcan1\x00', @ifru_mtu=0x1}) [ 648.388172][ T7348] getname_flags+0xd6/0x5b0 [ 648.392690][ T7348] user_path_at_empty+0x2f/0x50 [ 648.397552][ T7348] path_listxattr+0x98/0x160 [ 648.402149][ T7348] ? listxattr+0x150/0x150 [ 648.406573][ T7348] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 648.412044][ T7348] ? do_syscall_64+0x26/0x760 [ 648.416730][ T7348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.422812][ T7348] ? do_syscall_64+0x26/0x760 [ 648.427503][ T7348] __x64_sys_llistxattr+0x75/0xb0 [ 648.432544][ T7348] do_syscall_64+0xfa/0x760 [ 648.437060][ T7348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.442956][ T7348] RIP: 0033:0x459829 [ 648.446991][ T7348] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 648.447000][ T7348] RSP: 002b:00007fc12d650c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 648.447016][ T7348] RAX: ffffffffffffffda RBX: 00007fc12d650c90 RCX: 0000000000459829 [ 648.447025][ T7348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 13:58:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0xf0ffff, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 648.447035][ T7348] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 648.447045][ T7348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc12d6516d4 [ 648.447053][ T7348] R13: 00000000004c5bc6 R14: 00000000004da440 R15: 0000000000000005 [ 648.600759][ T7460] fuse: Invalid rootmode 13:58:36 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x179}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:36 executing program 1 (fault-call:4 fault-nth:1): syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_i\\'}, 0x2c, {'group_id'}}) 13:58:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x40000000, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000000)) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) 13:58:36 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x17a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 648.914073][ T7579] fuse: Invalid rootmode 13:58:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x7, {'group_id'}}) 13:58:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0xfffff000, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:36 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x17b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 649.167104][ T7596] fuse: Invalid rootmode 13:58:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="f05a82ce44bd9c97e57d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1, 0x80, 0x7ff, 0xffffffffffff3be8}, {0x1000, 0x2, 0x8, 0x8}, {0x654, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffc}, {0x7ff, 0x7f, 0x9, 0x8001}]}, 0x10) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2e, {'group_id'}}) 13:58:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0xf0ffffffffffff, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 649.433576][ T7609] fuse: Invalid rootmode [ 649.486498][ T7612] fuse: Bad value for 'user_id' 13:58:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x3c, {'group_id'}}) [ 649.531251][ T7612] fuse: Bad value for 'user_id' [ 649.651843][ T7721] fuse: Invalid rootmode 13:58:37 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:37 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x17c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000400)={[], 0x1f, 0x3f, 0x3, 0x0, 0xd1, 0x5000, 0x6000, [], 0x40}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file1\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:37 executing program 2: socketpair$unix(0x1, 0xdb6bb67a0518735, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0xffffffff, 0x3ff, 0x2, 0x0, 0x0, 0x5, 0x7, 0x40, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e23, 0x1, @ipv4={[], [], @remote}, 0x3}}, 0xfff, 0x5, 0x5, 0x2, 0x9}, 0x98) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000300)={0xa4, 0x6, 0x8001}) msgget$private(0x0, 0x110) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x2) socket$netlink(0x10, 0x3, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000009000000090000000030000000500000004000005ae0100000700000001000000070000000800000000000000060000000500000005000000090000000b00000000000000070000000000000000000003000000000400000005000000030000000300000004000004040000000700000002000000060000000e00000000000000ff7f00000900000004000000060000000b0000000200000000000000002e003f936e189036f84b56c8d66e685d1d38a1140f1a"], &(0x7f0000000440)=""/74, 0xab, 0x4a}, 0x20) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0xa153) 13:58:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x4000000000000000, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'g\noup_id'}}) 13:58:37 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:37 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x17d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0xfffffffffffff000, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 650.223673][ T7751] fuse: Invalid rootmode 13:58:37 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'g\\oup_id'}}) 13:58:38 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x17e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 650.426965][ T7863] fuse: Invalid rootmode 13:58:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:38 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x2) 13:58:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gr\nup_id'}}) 13:58:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0xf0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:38 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x17f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 650.813552][ T7878] fuse: Invalid rootmode 13:58:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gr%up_id'}}) 13:58:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x4000, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f00000000c0)={0x11, 0x40, &(0x7f0000000040)="5eeac1beeaeb2d5d", {0x7, 0x301b, 0x64737664, 0x1, 0x4, 0x400, 0xc, 0x1fb6}}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'mountinfo\x00'}, 0x0, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x2}, 0x10) [ 651.056753][ T7891] fuse: Invalid rootmode 13:58:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gr/up_id'}}) 13:58:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0xf000, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:38 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x180}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:38 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x1) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000140), 0x4) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000180)) r1 = semget(0x1, 0x3, 0x20) semctl$SETVAL(r1, 0x2, 0x10, &(0x7f00000001c0)=0xc8a) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040)=0x81, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r4, 0x200, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x5, 0x5d, @l2={'ib', 0x3a, 'vxcan1\x00'}}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x44040}, 0x40000) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 651.260479][ T7901] fuse: Invalid rootmode 13:58:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gr\\up_id'}}) [ 651.551899][ T7963] fuse: Invalid rootmode 13:58:39 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x4000) 13:58:39 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x181}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0xf0ffff, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) move_mount(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x43) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ioctl$TUNSETLINK(r2, 0x400454cd, 0x17) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000000)={'ip6gre0\x00', @ifru_ivalue=0x8000}) 13:58:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro\np_id'}}) [ 651.783798][ T8030] fuse: Invalid rootmode 13:58:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro#p_id'}}) [ 652.018001][ T8144] fuse: Invalid rootmode 13:58:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x40000000, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:39 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x182}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:39 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0xd000, 0x10000}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fspick(r0, &(0x7f0000000280)='./file0\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f00000000c0)=0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000240)=@add_del={0x2, &(0x7f0000000200)='ipddp0\x00'}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:39 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x44000, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000240)=""/215, 0xd7) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_addrs=@isdn={0x22, 0x216d, 0x100000000, 0x3, 0x1d3}}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f00000001c0)) getresuid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140)=0x0) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) 13:58:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro%p_id'}}) 13:58:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0xfffff000, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 652.355692][ T8233] fuse: Invalid rootmode 13:58:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x1000000) 13:58:40 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x183}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) fstat(r0, &(0x7f00000000c0)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:40 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro*p_id'}}) 13:58:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0xf0ffffffffffff, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 652.769468][ T8280] fuse: Invalid rootmode 13:58:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x4000000000000000, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:40 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro+p_id'}}) 13:58:40 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x184}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 653.016061][ T8290] fuse: Invalid rootmode 13:58:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xffff}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000340)={r1, 0x3}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x24, r3, 0x410, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xb056}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040004}, 0x8000) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:40 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro-p_id'}}) 13:58:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0xffffffffffffffe0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f00000000c0)="4e94401e993936d2f91edfef878ecc6169986310f69ba92a5df4a4ec800ce1aece0ced22149df530cdda2263fd13095ea94947888d3b85cab15365b6a8423ad8f07a889dfcf1210eb68fb21180a4fb7589d99835b7853a4d080a47b65ffbe810e1ebbb788711f1f7aa95c7bc4c73c46dd8c8be95a4fc0610fa23a5f7e429b0ca7115a94f3b8e231618d9270400b5a623335d3c4a231b4b4f99cf7ee8efad062ba2e1f0") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x20) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0xfffffffffffff000, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) [ 653.293752][ T8407] fuse: Invalid rootmode [ 653.331043][ T8409] binder: 8408:8409 ioctl c0306201 20000000 returned -14 13:58:41 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x2000000) 13:58:41 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x185}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:41 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro.p_id'}}) 13:58:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0xf0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) [ 653.719687][ T8527] fuse: Invalid rootmode 13:58:41 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x186}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 653.811559][ T8527] fuse: Invalid rootmode 13:58:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x4000, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:41 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro0p_id'}}) [ 654.074692][ T8547] fuse: Invalid rootmode 13:58:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0xf000, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:41 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100, 0x200000) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="aa00000046d2000001b8c0a5d50c75da18d2d5f1a6300ac5f5f1be602998d5aa08fb8820fc480393ae06fb981151d4ca47033a53eb26227bcc91e8348a81a48fc577b94f85f7d828866427a3858aa0cfa47dde3abf14e97e7710082b0c26fd0f69d1bb7592a342d95311b527a2c90400000050feecb45905495befc7e983dd1c53fc6fd53173f0f7b51b1d9f66204dbab70a2ebfc605a925eb7b0991d1e519e781f5113bc920bf79bf695d2f567eb985472d67f3ca3bce31aabe594aec0000"], &(0x7f00000000c0), 0x1400) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000200)={@reserved}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000440)=0x3f, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='4', @ANYRES16=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000380)=[@textreal={0x8, &(0x7f0000000340)="660f73f500baa10066ed0f14160058b8c0018ec0be0380b800008ed8b800008ee0262e0fc72f660f72e15d66b9cd00000066b80d00000066ba000000000f30", 0x3f}], 0x1, 0x67, &(0x7f0000000400)=[@cstype3={0x5, 0xf}], 0x1) arch_prctl$ARCH_GET_CPUID(0x1011) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:41 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x187}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:41 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'groXp_id'}}) [ 654.375042][ T8662] fuse: Unknown parameter '4' [ 654.404888][ T8662] fuse: Unknown parameter '4' [ 654.422068][ T8663] fuse: Invalid rootmode 13:58:42 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x40000000) 13:58:42 executing program 2: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x800, 0xa0a7b5d19f983622) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0xf0ffff, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:42 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x188}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:42 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7ff, 0x800) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gro\\p_id'}}) [ 654.728820][ T8683] fuse: Invalid rootmode 13:58:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'grocp_id'}}) 13:58:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x40000000, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:42 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x189}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 654.948510][ T8792] fuse: Invalid rootmode 13:58:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x201) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0xfffff000, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:42 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'grodp_id'}}) [ 655.238016][ T8812] fuse: Invalid rootmode 13:58:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0xf0ffffffffffff, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'groip_id'}}) 13:58:43 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x18a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643db384fe95f3c9fa453886e8590ffbbac73e39a24fe2d9b4cc1d7fb3839eb84315ad6379b08bc17704fa014bc804b964c54ff7f8da1d7412d8017af44d8f71842d52ea64d27dfb907b188ef6d3e9241b2fc8057bbde87f39cfe3b56949a6c7aca8bc11403d53f814e0d4a57ea9bf002a36b7772487b8a9f41cec73a1b243bec3b6a860fb1f99", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0xf2e, @empty}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e20, 0x2, @loopback, 0x400}, @in6={0xa, 0x4e22, 0x1ff, @mcast2, 0x800}], 0xa4) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff) 13:58:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000100)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000000)=""/74) [ 655.694369][ T8830] fuse: Invalid rootmode [ 655.702355][ T8829] fuse: Bad value for 'group_id' [ 655.755038][ T8829] fuse: Bad value for 'group_id' 13:58:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x4000000000000000, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'grolp_id'}}) 13:58:43 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67766f75705f69643da4accc8ab91427f5750f02e947ba9bae2340f6db20d39b4f38fb4951ee7082b0f3d7c5d10939a8749d5b786bc797c7b011337a29a028b5a2310c6c8d8b3eecccc3ad6009097a20d8904a2abac98c6eb0555d2b4d57194f3fb69ca2018e0a4003942374200ffd8dc4df9471c74200855769a9a51e86e41ff3c430ff1dead01ed0dbcd487feaa41f684eac6eda2e2b08faef0ee33b87fb5ca05bbe75bd9402", @ANYRESDEC=0x0, @ANYBLOB="0409f91be9f9978fa2c7d5f5c32e9949e2aa56183a64f70d4ab69bd5b5cafe98508912f8e0cd6867c93781a792dd1dc78ee2f6ebb3b875574ed07b6f7f14322e5bd42b3d90b1f2ef6550f856ff194b3b1086e27145f758c9c9036f388e4c5fd55648e79d3c7e135528155ebc1943e7b1bf26442eae9ebea86b2b51a4137398fcc77d759f42abc902b24416483a7d0f0dd9b0d1c9db002ea09d02d9d245bcf9e8c31807d7ab38f16d86f624e3ece82776f709eab79def55ac18abe1a3087c518f9875aec29bb69f4cc839b0996f9f496200"/218]) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:43 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x18b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 655.978141][ T8845] fuse: Invalid rootmode 13:58:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0xfffffffffffff000, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'groop_id'}}) [ 656.056936][ T8852] fuse: Unknown parameter 'gvoup_id' [ 656.102319][ T8854] fuse: Unknown parameter 'gvoup_id' 13:58:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='\x00', &(0x7f0000001980)=@random={'system.', '\x00'}, 0x0, 0x0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x2, 0x0, 0x1, {0xa, 0x4e23, 0x9, @empty, 0x5}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="b6807b0476a99805a914170c1ee4d6bccf1ba0c0ffef8569934d5b10271b5671214914b7f6896edc59a0a91b9401c7eef115be93e9c47839df1fefed6bc9a0ca1575972e816be7a2084f2586cc804cba12142027d03a27208d44e5d0d33da993082eb369a03e11b52e5e02d62c324e5f7493ad4c2002d64a7f8e0d858ac51c82caf2fdc07b7507b05c341dbed5f51f63501620be8ce8a95be3375798ae66b555ff058ba53ef151124346ddfe49", 0xad}, {&(0x7f0000000400)="e90eb89c07f04c3c702d54a31740089920fe27b2dc3be6da64a72dfc1121797da03827694d2ae1e945ad9f5623ce4e7b854c3608cf617ed20cf326dc3ea2a09e9567cb54088cd8d781372571ca10fd119b167f8d98e367eae1d7a1b2261a50759714c7936eb4b405aecd71476e273266f43054a81b134b9c22e317b398e2da508c0b43ac47985143d21cce426476ac1d072c7ab6a0337a140f94e9ed86bb52b2c3f642ff964ba269499a2d434d5b6342a6c6cc967e1f0aa28f0d5918fe2e11d4d098dfa659058e090b2d774d123db830d1b98b0515ea0545820edb6d5be00e032007701115a38b656d7678056f95", 0xee}], 0x2, &(0x7f0000000500)=[{0x100, 0x1, 0xe8, "9475e32af442b154a8f036685a7dc3ec0cb2637fc79adf8277071eedd9730626e8d43af15d3805ff5e142d53615bcc11e9fa48f075a922de073c808e02f08f435e18c54b8c0bb3970fb7eafa249c8b9b8b013e573de2300504a1fc7721e44bd056f010ed3cbf2fdbdf0181cb1659915983fe9c02b8e16e2d4458dc77d4e62064c8a12d95f8dd97667a7f450f96f626c945533cba20837274c7a95cf4661fc209870263cfc8fb05b5d54a113ab134a14642616909333efab9a82e514b7d61a64c272417325e4686cb8603889ef0eb1d8133559f331de550d530c7e2e8aab5490c4fd92baa46904d74c98e24e46472fb"}, {0x108, 0x100, 0x1, "7dfd4693b593fd4486bb4f2e78b32686198f19a240e5c67e2d3d08eb58a8ac5193baa664c75d54f01f5a12d81274e700854d529e7ce7f891ec055704e35af8817565c589887e19a107095d98079668afc7b19863c559883da9146dc45017b1f18861ca2d40019bd56697ef2866f67e37f551dd6ca5758762115f8a30eb64720c17c6dce5724455a27afd7c3c3adf4abb5826422225743c4433161cb2e22ee566c8f8515203bcd2646ce6f2d222ebd77a019f80de2c8b918d198513fee648899d993c34f31252e7c76193d7001efad2696e5d34ff19efa814735a8b0b62b2efa2dfd2a0aa81079eb5630da52c3e6191976d81"}, {0x108, 0x102, 0x3, "32d7c146eea744a333794e60810289ae6e19bcb7cd3d2067902de3d74b9fe9fef6f4454aa5a52431a8af99fdc5ac3e12d984384e055722c3b2923fab662dd78be3929d7afceb8a93d4ad58555472fa09770c546c0e2500cb320000848836236df097bc75d0a8dbac985a70491db38d3f6106026c59e2beca25ab04eea888ca16b7c24679f53f143eb7e0ac9c70364b50e768f163d12144193d413e553e9cc3edf1e65dbd52f8d9b44412b5b79b5cf861a9bd95c5f51db2f276ef8e585d65aa3e30b452f0dc1cfd17a2c2775ce77d2a724fbe1523699f1a084b4ca3ac6ac6fe958fe18c2816c14bd508e53a5370b5a0f083e9fa19692125"}, {0xd8, 0x10c, 0xfffffffffffffffa, "afb1d55840ca7672d4c7827eafe6cbc02edc761c39b97e54671a94a3e36c93e1ad147560fc8e6be4f1d42fff6fb71b5d3d7b11d0a92dc22293cd1b311b4c7230bfd40d7ecc3a0a6e67db4bfb3f5982d173df11438b0f6ff746a99f8c4f1d1e832f4346e90b6b9381c6fd450a448651e6a3bd438e5fc17eed7e21ee765bbc79980ab354ff1388239182fff40e029aa3292caa46ff4291b2ba9fd93d88768d5033426172d837e7cea2bc5ae05c47fa5cf4874f0c8503913d7a9e9af361b0cabdb2c06e864e56"}, {0x48, 0xaba67f77d39321ab, 0x80000000, "8ae62dfa6abd184ad96e46075b5db331223b2f7b007b8fa1462767423bd06e2c48813d046dfb7d227e8787d253d2b2ce61e1"}, {0x1010, 0x102, 0x20, "eab1872bd7f8c1a8a2fe65559c03c3e5b108b77a0f596dad91a74ee1f636ba6cb1db7f7de3be308d85d499e9a35afac37e0f2c1df0a349d8432932837e3fc078b091506b7b00d8ef0fe75e89cef6368b5992baceb9882e42e945a62ba216fd8c383fe710840972fcc1659d48e5f4437c462ced63e8b3916a2e867be79bb56d95fdd058b8ab21d73bb5d02d6622e68e7d35c6a6a6328ad5655f13f42daf8380055d88ae6f98d90319cea240e31780b5eaf4b1fc1fb461b02a97eae8b8a6eeef2cc4b52cc8690d200d8a376632ec8a0c0d95eaa027c9fa6bb14a69b4bb10ba97efc34f1702447f49b941b9e5e0e2ea5533222d2c7f415af2487fb035bdda7fe97b106777c37f9354e967744bd172e8082b273ca26448d410636a195b4dd2c67613a3c72c211a2a61b9f93453b9a7f5cc494e3d04963f2f943973bf280a9f434a7eac7929953e15858079ebfb168c1f0786286167a9ac45764ac4d769dd39b4c1f6b93609d707730682aa03da490e0ea9de3a4cb5470c127557ed96959cb89c0fa0bac13dbe0c1675b3fefba1ad02e7279d54d2ddd685e62c45a2911c28a57b685ff115d8ea3241f9cdac09b2807ccda10434a0cf987b046c84e0cce84b289dd19c8db1f48b7f76df9da8b9d95e136267883677092cdbf230b28f8a2c7435862d353940319f6a5bad265024a63d319e0bcb3125c2f03a2b4deb759c9a4228dc4749ba713ab182d2976ce71aa4966ea43d9c3b7fedc61a67738761f2d80ac6c7bcac525ac68891423ecd7cb4f3c994da21d4c6d5e96750952bdc499b7a7b20e9309db87b8585d3439c8fb6953daf9171961c307bda0af7b28d6b73edf739e08892f138b08d3ea26ded1849292c06e1fc9973ff71b018307420972af9e5d180c97b5bbabaca99063ca0fb2b877f38f6b35f8eb0e6df2e6155eeb9dc307e20ecc35fd82fa53e58d75dd53c2d001bea1fdc06c2f1ace392726084e313533454977a59d9431bb053a2ee002eea7d14cd3f6b1a18c87a15dd3e10e00d2424a0741480f865588e2fb44eb22de683bdf04e5bc40462fce0e6632940c00d39455256c0b2a36853e0945ac93d451c8eb680b1c2ddc73bfbb791ef1233fc2f57cfd34a845dd00151684757d33b74febec725c495d3d45297f3829083fcf48937317004842bc9e523ded82de6994f6c962f7c5d66751d52cae4fac7e0c58b1c40eb53182f7beca783a83f599e4b9bf5dfbfbe6a22e8b4b92eda14d512b2d15832a477ffcc570f3d3a2b93ca43912e1acc7eb28dc64c12ca99bf5009c89a7514ba53911e7b40310c07d97b1d43e7d668a5d8460b3ff34a873a964eea9e4da8991397de549ee1d3c0f8fb83ea0579e32ee6ee9c426340589325f963bd661745edc47f1acd6a4f0cd4d9053921f4b4c3de09c6d1a35b3b1e4c373665b49a7af8cf789fe696c9c323f677d4ca18a5230e6d16ecc6cf2362b6d80822790f5e36c225e87602a84f947954edf0421065f2d0a5e8302de6acebe507785a94234903ed0388ea3c5a4bc2080e92c892edeb302345aedd6ea1a28ff6fb0ae5cf12593485c5093071a43aadbfd8c305957c9978327337e481c1bc6c172826716e59c011d2fce7b8ca8532de950613f563a51851804d0d266e0bd9ee2bd6122493e3606e6e77b547f9d376f6eaca451f45244c652a2caaf803238f115c6187e1e373cfd15249559d112693d1e58237c8d4f1588c66f1c3409dbf513854d332a914b35f25110e28cbbf1d0cdf9c134def936af90713717444b71080cadebcbbb8339a77e36ea00e88e6be66ba144df2758f3c1270b625d0938a0673d08615a25b673d792a0621c04a415d497c3bfaf4b9761bfd5f65aca2fd44421469ac42cf02ce81214500f4c989a44267a4503e95a70fe3d677ea71c17939971f502504ee782cbc2dac3d5d8a00332f5445f74adc9e40984f9e50137b8ae1348201e9bb8f55f4a8af96a789420a2f051f8d6d69916ec84195340f90c40c7d5f5807302cf99685e6a20cdbb77f7d2af236a3d44fb5eb527a7db0db04a631a55f499449b4af3fe625ead8816a18fe10329e7cb9e00ac63b82be6bc632081307340f478b145d4b9ee7a329e499963a3f6a1761758ffec57457458d3fdd8cda58866a1ea935d29ef95b046f1bcdc506623251b2d6e59637d677814d4b1379559326b1b0414fe341602d8aba0acabcafe828e747917e1026456cb65d59ed105d8da49ea21061f45776dc33434c292bbdcaae91213e86480824c236e52409bb9b2cff7e86f18874fb5caa5dce476210a710035b42469dd9b991d2e03c19534950cf56910b1d006c55ae9fcf11c3388a7e3331c9fb56d6abd265599a803c90ba70f0dbf10594e5c4269212458338987b0167c8216115c2f48c837116c5518995ee1fcc812d9ede3484fdabae0375e53518d6df0d086c0dba44bc809e1c4bb84f99bfcd9eb6a5e0517820fb939067aeebd2993912a44d9f09c0f1b6392477f1bf04451859433788b392a9d5c5b304f52585aecf7c54e9ee5417c245c02f9cc6c5c829f244ae135ec779aaa649d497a0b08a7c26f897327917b832b8b9f1accd0a5a6e39613c1ac42824d9a592c76b81b8cf7a99833ab65e5187c270e346b5c16de3cd4b7870ddfa3f7ba39ba5a4853291a25993ba92d3e3fe04386e1a14f417f59aad84d4e157e9f840f60bfce65ed99e8aad18d3cd0512b9e271acfe34be6635cec0489b763e26d97a53879f9b75051a5eb2588042432a8dd30968892ff4f912b59886184766043b2149b11d5423dc8ac91d731278777b7d751d4c49ff16f16f174c58e1f6c4fb62aeed6c1646a68dc37e9fdf5b0c20364e1abab52fa3212cba6831f24043d147358fa793c314dbf66feaf67cbc2d92ed73050c2785a1b8ab27cae5f763c609982e3a3dac1d429ab4c4d6fbc86ffe8e1e2502fb681210079fb4b7bf8b6d83ab8fc5b59fd5e29e8a420749c4869ad6cb198a9c7b1f33d2a5f75c1155e4b82d6f88fc4ae2c7e0ff147ac7d0161ffd4f55733116f325e8f1b7fe8724c80b43fce1b7255e31c32924deb0c6ddc395cc6560680f3eadad6855d36e372b2f4bbbe32ef9692fbfa4ef4b5eea23007c5169d9fc862efd3c8a6cc3a430a0465e30de72cab826e97e6736d09105a123b8f4c85ee43fbdcdf329ed37a86c2c5920af7f3078e3d12c14ec5e0d37a06fa348165337cd70cec70887ec53d660fdb45a91e5f0f2e45ce12c0039683b9d2d213053535606c6d4b800be59159e71e58eb677a95b0bc77171b1bb2afa86edc3fda9f300d0d3c3ddeabadbc968fbe94d84a3997e14dee09645fe8ff979bef2724ef1d130bb22b550b66cd9fa5a904a464d621dcad25f7fab337241d338c7cb7d0ae1d238a21cc3a0bf8fa3f67cc5da43f1c35ace10ad1deddbbd3cf97f926889034ac0a27675f8705717ebb4d6f2e90a351724d2e62a898ce9e33f75d4d68c3eb1c4b28571427f812c9fa2eba40ccbcdf14bf4c247d33c02d298e22ef2f636d2f9da18c2b255c8bc5e58987b2ae887a04fa78cd62048dc80b4d9f00f4b1146f6da72f37c844232c642d812211c736d6f2febe38c925da6ea224ea8236158f1bfaf0cdad3281a7fb76649b62f2d624e52c6a8499ab95a41e71d691e127cf1283a0202c9f020d6893c8fbefaba41ecf60410558be9c4cc3571ca56d1216ff6be68ed63fea69e4a2dfa51fb2e321aa6785aa440321501035744f7492feed651ff343dc91e4a5cbfd384b85bf7e38be3ee9563014498423a4afede6cade6903089b03eb932585c2fd220e944cf4c011f471f498fb8444e063aae102df9893e19fa33cfbcb1fb9d00b426080817111bcb329d94967de0f5f93eca63f37fa2ff1fd49ce311484317bb0552f5f781d3e6f17e5b9b041d15a46a7a27ee2182bd5adbaf6563e574f23689571b2d614146e3ba487125262dd7ab7eac6185e7c85d7f06976deb8154bc89188ca327acbb6cc792f9381ddfeb4c9ee1416935cd7f86c13203710aba70a87ef9170fdb475655bae81e825ab281f96904a7b5517b1d08f2e25b994c26a9c2b7349afd7a524324f8d0f373c27e48ee9882a70e265134966eb7d39a8bf794881bc8d71044b5a2458d47368debb5727a56243144367386f26979a6ec3f5601156b051835b9b93515e27a7e0d53d83846373dc6181e783d480af39295111bc073660357f01ae927531988604795ec86835b1dace8984adb4fd9e6493d7f66cf1ffcb99afe5907e9fc67d962c55f3edf59f135a8e00f32f101654e7a82a65ba7948a9ddad23ed9d658b043e6e57c88b75b1cc01540ff6dd6161c70f8fa36d8ab9e192affd80128d26c6a4bd488b8e0439b90c51a5e3c09dbad62fe64f31236a29da2679da0c1ce48aa6f49d25319979091f05b7acce8cb57a26700dff9f44e2e063c9bcaea8e639d397b5f518b842fb23b205d1fbc4c2275a47de98fa37f9d527109173a0d57dc8162f8bc0a9942d4924de35daff57963c81f37b6823890b4a59350e061c003302dc7df607db641ca40c6e1a077e38b8adba50ba0e26c71527ed791643717134dab57ef834e36d54330c276be474e3a4ad7fda419bd9d11b437e3432ea26443902d6732c87cac3ec3ff115a47b7786a06ee7a2cf189a07f92963c88c3569224de7ff221ac6ec4115e9ff59bc54beaff37631471aa76b6a12d84555bd1e61e49167ef1e14f0e8c90b3b9a19858f463cc81cad18b3ee7b79a00245b5795181056bddcc19ee059fff8304b47071d8e8cc2438ca2861eae36388d89c71a4877a72d2a113a5caf72051f2125d985e8fd50d156c11c4013cd3d0cd9ec3b54ac004668078e3d377721ac826be9f0524a8070dbd7634394fc2e1554b37d1147fa6c8a3cd0b882075638dceb11ae0f97f896b23c203920aa3af9caddeb8df7fb7b9df135cfafd375ff14a4eab941165a39725e6948e3190fc21dda2e69cb4c8a4ecf8c04dd8f6545daa6a852832e8d077473d8d8ca8397e0d9b4bb0340d86b16727c70329f1cd0f4abffdd78b7d8ce794edb740b61278ae6b3427fdfd2d106f9f2b666d4268b7d9dd2f10ca228b1df7208b97f69256558d72b8c8df35fd3b65a32564e6bb67d32abee0447f579591591ff76274347bf42101962ff5b9fc4d6e4e2f0cc66989c3ce66d042abff0e8a6873088761404402eaa55a9a8decbbf3e0484c1ff79a3c32b68159c851e50757d006e0b3c4f43b4f13b9c6a33e325088c57f0eb423f2381d38c675048ace5446d6dc1c7545693721f83e74f2c2a1a18eaab62e22416d95ab47ffbc57efa8f26ad551a37e914ab742dbc05a294413d2b4a2e9447c93bebaadcd6195c5fafc0b7aea93a4448efccfcc61bc713375cf8177f6e69357609069162f85e90f6864306ba0c8d5508fb0d452871d6177030f68e6a32b066efc2b6b9160d35e918c20f9448c54140f1b0ab242f965a6f03c1da0bf40e146cfd0f978d972054d7cb51f2702dfd12abc0555930aa24358e83d98cb5e2d9e7929a06c23ae0ef7edd745efb955f9c30ccef04caad0ee65d23a658434544776e4fd28d93f5227eb8e1395c986c5897f9e88d8044754e6a50cc368642abcc13197f62fa2c0552d1959c63632e6d10aae67dad86cbc608f23b9e89d636ac5fb5e469f47f68cecfcff5ed6e4e50f39dd3a8b2b37bd8f69bc84c39d257e7cb7a5a5561a0f1a3e8aba4deb125ff2b2e7e95af0522a09f2e3fd9052fb1132cd2ffa915c58019a84e041c53a3fe480a08ae78041b719742263c9cf1286de1143b0135aa7f"}], 0x1440}, 0x800) [ 656.238047][ T8862] fuse: Invalid rootmode 13:58:44 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x18c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0xf0, 'fuse.'}}, 0x2e) 13:58:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gropp_id'}}) [ 656.505353][ T8975] fuse: Invalid rootmode 13:58:44 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff) 13:58:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) r1 = semget(0x3, 0x3af6b969a4dbadfc, 0x428) semctl$SEM_INFO(r1, 0x4, 0x13, &(0x7f0000000200)=""/135) 13:58:44 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x18d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'grosp_id'}}) 13:58:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x4000, 'fuse.'}}, 0x2e) [ 656.788981][ T8995] fuse: Invalid rootmode 13:58:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'groxp_id'}}) 13:58:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0xf000, 'fuse.'}}, 0x2e) [ 657.007200][ T9010] fuse: Invalid rootmode 13:58:44 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x18e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:44 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_\nd'}}) 13:58:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x18000, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 657.228905][ T9128] fuse: Invalid rootmode 13:58:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0xf0ffff, 'fuse.'}}, 0x2e) 13:58:45 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0xffffff8c) 13:58:45 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x18f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_%d'}}) 13:58:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x40000000, 'fuse.'}}, 0x2e) 13:58:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034203030322221aad9725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f754b96077c3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 657.724251][ T9152] fuse: Invalid rootmode [ 657.730277][ T9156] fuse: Bad value for 'rootmode' [ 657.753749][ T9166] fuse: Bad value for 'rootmode' 13:58:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000006c0)=@md5={0x1, "ff31ccb92efc50858a0c2124d696c709"}, 0x11, 0x3) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f00000005c0)={0x0, 0x0, @ioapic}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xe2830) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="324b6c9494364cd79dc0ca19bc", @ANYRESHEX=r1, @ANYBLOB="168f474be0d8692c726f6f746d6f64653d30303030303030303030303030303030303034303030322c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000700)={0x6000, 0x2000, 0x3, 0x4, 0x8c66}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000000)={0x1, 0xc, [0x9030, 0x7, 0x7893d38d]}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@hash='hash'}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@pcr={'pcr', 0x3d, 0x10}}, {@dont_hash='dont_hash'}, {@uid_eq={'uid', 0x3d, r2}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}]}}) 13:58:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0xfffff000, 'fuse.'}}, 0x2e) 13:58:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_\\d'}}) [ 657.971510][ T9179] fuse: Unknown parameter '2Kl6Lם0x0000000000000004GKi' [ 658.021128][ T9198] fuse: Unknown parameter '2Kl6Lם0x0000000000000004GKi' [ 658.049262][ T9199] fuse: Invalid rootmode 13:58:45 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18626beb2e780f0c2a", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_i\n'}}) [ 658.160890][ T9204] fuse: Unknown parameter 'bk.x *0x0000000000000004' [ 658.200006][ T9204] fuse: Unknown parameter 'bk.x *0x0000000000000004' [ 658.286305][ T9209] fuse: Invalid rootmode 13:58:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0xf0ffffffffffff, 'fuse.'}}, 0x2e) 13:58:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_i\\'}}) 13:58:46 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0xffffffffffffff98) 13:58:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x190}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:46 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0xfffffff6) 13:58:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x4000000000000000, 'fuse.'}}, 0x2e) 13:58:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x410000) read$char_usb(r2, &(0x7f00000000c0)=""/173, 0xad) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 658.876051][ T9336] fuse: Invalid rootmode 13:58:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x7}) 13:58:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0xfffffffffffff000, 'fuse.'}}, 0x2e) [ 659.158288][ T9353] fuse: Invalid rootmode 13:58:46 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x191}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2e}) 13:58:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse\x0f'}}, 0x2e) [ 659.356173][ T9462] fuse: Invalid rootmode 13:58:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x600c00, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x9}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={r3, 0x3}, 0x8) getdents64(r2, &(0x7f00000003c0)=""/38, 0x26) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x20002, 0x20) setsockopt$packet_buf(r4, 0x107, 0x1, &(0x7f0000000480)="c5fa10ace942f955ae657e16ce767ecad0d6bafc69b6398f8a2361cf53d26d3fecf8c9805329021ac499836f44f83666301967b5d9f0070d326ffb51ffa5fa69d505e78ad223902bbe9783e766049998a9a109f03e9ae6e99e114553bb3f071e22bb28401ac079b8600c30da301c5e3c1d58e62c709e157cb4", 0x79) fsetxattr$security_evm(r0, &(0x7f0000000400)='security.evm\x00', &(0x7f0000000440)=@sha1={0x1, "bce68508be978c1cccc38a4e81266dc7d1b7a7ea"}, 0x15, 0x1) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$packet_int(r5, 0x107, 0x9, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 13:58:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x3c}) [ 659.579443][ T9476] fuse: Invalid rootmode 13:58:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000000)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="05003d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x192}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:47 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x100000000000000) 13:58:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x2}}) 13:58:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0xf5c, 0x401, 0x4, 0xda000, 0x0, 0x193, 0x7ff, {0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x9, 0x8001, 0x0, 0x7, 0x8}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r1, 0x1}, &(0x7f0000000140)=0x8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="46643d0fe9e9205cac11e79eecab39e61a1e5bf76560cf237fd41cbd6ac34ce8da98108f3871959119f46eadab5a14191494805b29ca60c220766fbdb30bb2c031ee66dbc4257e1f856696cc4e27f90f5d9dd712875da3c91ba812621a08ed69b2b9fef58f7ff2fbe231ffe2c02691fcc75d120d0fd699ffbd68d22c24a893f3e77ffc2175d2052e1100000023f527daf3195fa046f53e11c7735e6bc9c07750858f9809dbfebcdb4c2bb26ef113395d664a39f20b6402262b72464cfe649b4fdb759ec8090afd1ecf749b18b9a05a5ca22ce3ef77478e7fa85ea91a5c801166a515ddae051f5d03ee65e20fa03c23c5c858946f956c83782ef02acc433e8b8e073b20a0f342d2ddc752315ba4c786faed7ef686eaf257853970832e32bb8ff3a3351e60775c4203cb5b812f16cd", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000000)={0x1000, 0x5000}) 13:58:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x193}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:47 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000000c0)={{0x8, 0x7fff}, {0x3, 0x400}, 0x8, 0x2, 0x80000001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 659.948976][ T9595] fuse: Invalid rootmode [ 659.963048][ T9597] fuse: Unknown parameter 'Fd' [ 660.024754][ T9597] fuse: Unknown parameter 'Fd' 13:58:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x10, 0x4) 13:58:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0xf0}}, 0x2e) 13:58:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x3}}) 13:58:47 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x194}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 660.257383][ T9616] fuse: Invalid rootmode [ 660.294965][ T9616] fuse: Invalid rootmode 13:58:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x4}}) 13:58:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0x4000}}, 0x2e) [ 660.460513][ T9629] fuse: Invalid rootmode 13:58:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x195}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x5}}) 13:58:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0xf000}}, 0x2e) 13:58:48 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x200000000000000) 13:58:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 660.918632][ T9755] fuse: Invalid rootmode 13:58:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x6}}) 13:58:48 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',}']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x196}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0xf0ffff}}, 0x2e) [ 661.147613][ T9831] fuse: Invalid rootmode 13:58:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x7}}) 13:58:48 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x197}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = shmget$private(0x0, 0x3000, 0x78000408, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000240)=""/223) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_addrs=@l2={0x1f, 0x5, {0x5, 0x2, 0x3, 0x0, 0x100000000, 0x6}, 0xb33, 0x88}}) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x280182) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) shmget(0x1, 0x1000, 0x250, &(0x7f0000ffe000/0x1000)=nil) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x1000}, 0x4) [ 661.399066][ T9896] fuse: Invalid rootmode [ 661.437520][ T9899] fuse: Unknown parameter '}' 13:58:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0x40000000}}, 0x2e) 13:58:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x8}}) [ 661.480654][ T9899] fuse: Unknown parameter '}' 13:58:49 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 661.641360][ T9979] fuse: Invalid rootmode [ 661.699396][ T9979] fuse: Invalid rootmode 13:58:49 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x4000000000000000) 13:58:49 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x198}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) open$dir(&(0x7f00000001c0)='./file0\x00', 0x2000, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000040)={0xfffffffffffffff8, 0x7f}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) recvfrom$inet(r3, &(0x7f00000000c0)=""/188, 0xbc, 0x40010042, 0x0, 0x0) 13:58:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x9}}) 13:58:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0xfffff000}}, 0x2e) [ 661.950513][T10043] fuse: Invalid rootmode 13:58:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0xa}}) 13:58:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0xf0ffffffffffff}}, 0x2e) [ 662.216575][T10062] fuse: Invalid rootmode 13:58:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0x4000000000000000}}, 0x2e) 13:58:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x10}}) 13:58:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x199}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 662.445486][T10181] fuse: Invalid rootmode 13:58:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) tgkill(r2, r3, 0x1a) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:50 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x8cffffff00000000) 13:58:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x48}}) 13:58:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.', 0xfffffffffffff000}}, 0x2e) 13:58:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x19a}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0xf) [ 662.943522][T10274] fuse: Invalid rootmode 13:58:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x19b}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x100) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000500)='\x00'}, 0x30) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x10000, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000005c0)={r3, r0, 0x6}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r4, 0x4) statfs(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/153) open_by_handle_at(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc0000001f000000ff9551ba099ac13c122f4bd16dbfffc56e8183bd16482cf6e8efdbbd40290f086b0beefe46d830605c8beb3a94e6db2642454059b70713aaed53ca2fb752c4f0a9aa393363aa67ad0cbc83d888db44222a9150decfb1bec3844e5028c4b9b66dff1d2216f373c968ef8d248bba44e2e9a3a75aa489075e6a4b82f9af4bf4139d31d493fc216641606345a16d7ff8deaf37b201563956b3121b7fded45566ccf9da8d36ab584ac72da172a26814dd7373b4b742033711ed8ab1a4a736ec6f000000000000"], 0x400000) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x1, 0x0) accept4$nfc_llcp(r5, &(0x7f0000000340), &(0x7f00000003c0)=0x60, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x5) 13:58:50 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x4c}}) 13:58:50 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x19c}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 663.247899][T10338] fuse: Invalid rootmode 13:58:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2000002e) 13:58:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6664bd31c049adb208a9024d72914d73b803183be8bae316bfb216000071a614c8146c920bdd0e5f0000000000", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner<', @ANYRESDEC=r2, @ANYBLOB=',permit_directio,uid>', @ANYRESDEC=r2, @ANYBLOB=',\x00']) 13:58:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) mq_timedsend(r2, &(0x7f00000000c0)="ace2d5f8a78c16736a56978828597b8949acdf9f6c3ae9831eb4d0eb4519f594b444b5a511a10aa1aceee2a9053712842692f4b35b2fd5eeafc9b488ecacb1f530228f7aa485464301428c64c57f9e49479d8e5c64e5c9f4071dc0f961", 0x5d, 0x9, &(0x7f0000000040)) [ 663.627814][T10456] fuse: Unknown parameter 'fd1IMrMs;' [ 663.665338][T10460] fuse: Unknown parameter 'fd1IMrMs;' 13:58:51 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0xf6ffffff00000000) 13:58:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x60}}) 13:58:51 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x19d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "5deee3833f5c0a38f970fdf0dfbb3b8c"}, 0x11, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) io_setup(0xfffffffffffff800, &(0x7f0000000000)=0x0) io_cancel(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f0000000040)="b33366c436015da529281d72a6dfce389762e4086237c9a9c0a942b909ba500562108cbd", 0x24, 0x401, 0x0, 0x2, r0}, &(0x7f0000000200)) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 663.868155][T10465] fuse: Invalid rootmode 13:58:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x68}}) 13:58:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x2, 0x6, 0xffff, 0x9, 'syz0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:51 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x19e}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @rand_addr=0x190725e5}}, 0x1e) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 664.191626][T10586] fuse: Invalid rootmode 13:58:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x6c}}) 13:58:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f00000000c0)='clear_refs\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x42, 0x1d0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x19f}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 664.373446][T10596] fuse: Invalid rootmode 13:58:52 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726ffa643e48c0e9ae35d0cb276f746d6f64654e30303030309052cadfd6564c5890f203edb0053030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x74}}) 13:58:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x321200, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x1a0}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x10000, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000020000040002,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',context=user_u,rootcontext=root,\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) [ 664.852407][T10617] fuse: Invalid rootmode [ 664.881999][T10623] fuse: Bad value for 'user_id' 13:58:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x7a}}) [ 664.930752][T10623] fuse: Bad value for 'user_id' 13:58:52 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x1a1}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) getgroups(0x2, &(0x7f0000000200)=[0x0, 0xee00]) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='fuse.', 0x40000, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}}) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) 13:58:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="48cad60fe06239444d63", 0xa}], 0x1) [ 665.090617][T10694] fuse: Invalid rootmode 13:58:52 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1, 0x81, 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 13:58:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x20) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 13:58:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x300}}) 13:58:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x1a2}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) 13:58:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000000)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'fuse.'}}, 0x2e) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) r3 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x20, &(0x7f0000000500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vmnet1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\-\\trusted)^lo&'}}]}}) [ 665.525936][T10844] fuse: Invalid rootmode 13:58:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000080), 0x4b9, 0x0) recvmmsg(r1, &(0x7f0000002d00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/50, 0x32}], 0x1, &(0x7f0000000340)=""/21, 0x15}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)=""/104, 0x68}], 0x1a3}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r1, r0, 0x0) [ 665.553006][T10868] kasan: CONFIG_KASAN_INLINE enabled [ 665.558641][T10868] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 665.574622][T10844] fuse: Invalid rootmode [ 665.582636][T10868] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 665.589595][T10868] CPU: 1 PID: 10868 Comm: syz-executor.3 Not tainted 5.3.0-rc4-next-20190814 #66 [ 665.598697][T10868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.608772][T10868] RIP: 0010:map_id_range_down+0x87/0x370 [ 665.614411][T10868] Code: 6e 81 c7 00 f1 f1 f1 f1 c7 40 04 00 04 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 a0 a5 03 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e 9f 02 00 00 4c 8b ad 68 ff [ 665.627688][ T3895] kobject: 'loop5' (000000004af35fac): kobject_uevent_env [ 665.634015][T10868] RSP: 0018:ffff88805be97a30 EFLAGS: 00010246 [ 665.634027][T10868] RAX: 0000000000000000 RBX: ffff88805be97aa8 RCX: ffffc9000cd10000 [ 665.634035][T10868] RDX: 000000000001161f RSI: ffffffff816e8ab0 RDI: 0000000000000000 [ 665.634043][T10868] RBP: ffff88805be97ad0 R08: ffff88809af2a040 R09: ffffed101380e3db [ 665.634050][T10868] R10: ffffed101380e3da R11: 0000000000000003 R12: 0000000000000001 [ 665.634057][T10868] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 665.634076][T10868] FS: 00007f3193d40700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 13:58:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x500}}) 13:58:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x600}}) [ 665.651268][ T3895] kobject: 'loop5' (000000004af35fac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 665.655180][T10868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 665.655189][T10868] CR2: 0000000000738008 CR3: 0000000097eff000 CR4: 00000000001406e0 [ 665.655202][T10868] DR0: 0000000000002e00 DR1: 0000000000000000 DR2: 0000000000000000 [ 665.655210][T10868] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 665.655214][T10868] Call Trace: [ 665.655237][T10868] ? __put_user_ns+0x70/0x70 [ 665.655254][T10868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.655276][T10868] ? fs_parse+0x53c/0x1080 [ 665.673778][T10876] fuse: Invalid rootmode [ 665.679443][T10868] make_kuid+0x23/0x30 [ 665.679461][T10868] fuse_parse_param+0x2cb/0x750 [ 665.679483][T10868] ? process_init_reply+0x1650/0x1650 [ 665.756091][ T3895] kobject: 'loop5' (000000004af35fac): kobject_uevent_env [ 665.759901][T10868] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 665.768579][ T3895] kobject: 'loop5' (000000004af35fac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 665.768800][T10868] ? __lookup_constant+0xd6/0x100 13:58:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x700}}) [ 665.802134][T10868] ? process_init_reply+0x1650/0x1650 [ 665.806607][T10883] fuse: Invalid rootmode [ 665.807508][T10868] vfs_parse_fs_param+0x2ca/0x540 [ 665.807528][T10868] vfs_parse_fs_string+0x105/0x170 [ 665.807544][T10868] ? vfs_parse_fs_param+0x540/0x540 [ 665.807570][T10868] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 665.833061][T10868] ? kmem_cache_alloc_trace+0x397/0x790 [ 665.838610][T10868] generic_parse_monolithic+0x181/0x200 [ 665.844165][T10868] ? vfs_parse_fs_string+0x170/0x170 [ 665.849457][T10868] ? fuse_dev_alloc+0x410/0x410 [ 665.854322][T10868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.855643][ T3895] kobject: 'loop5' (000000004af35fac): kobject_uevent_env [ 665.860570][T10868] ? alloc_fs_context+0x434/0x6d0 [ 665.872684][T10868] ? vfs_parse_fs_string+0x170/0x170 [ 665.876692][ T3895] kobject: 'loop5' (000000004af35fac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 665.877975][T10868] parse_monolithic_mount_data+0x69/0x90 [ 665.877993][T10868] do_mount+0x924/0x1c30 [ 665.878013][T10868] ? copy_mount_string+0x40/0x40 13:58:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x900}}) [ 665.878036][T10868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.900969][T10888] fuse: Invalid rootmode [ 665.902949][T10868] ? copy_mount_options+0x2e8/0x3f0 [ 665.902969][T10868] ksys_mount+0xdb/0x150 [ 665.902986][T10868] __x64_sys_mount+0xbe/0x150 [ 665.903003][T10868] do_syscall_64+0xfa/0x760 [ 665.903021][T10868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.903032][T10868] RIP: 0033:0x459829 [ 665.903055][T10868] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.961931][T10868] RSP: 002b:00007f3193d3fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 665.970346][T10868] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459829 [ 665.978349][T10868] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 665.986332][T10868] RBP: 000000000075bf20 R08: 0000000020000500 R09: 0000000000000000 [ 665.986710][T10892] fuse: Invalid rootmode 13:58:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0xa00}}) [ 665.994304][T10868] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f3193d406d4 [ 665.994313][T10868] R13: 00000000004c5e2b R14: 00000000004da938 R15: 00000000ffffffff [ 665.994328][T10868] Modules linked in: [ 665.994863][T10868] ---[ end trace c9f4b2a1310c1cee ]--- [ 666.025485][T10755] kobject: 'batman_adv' (000000000a64debf): kobject_uevent_env [ 666.026401][T10868] RIP: 0010:map_id_range_down+0x87/0x370 [ 666.033232][T10755] kobject: 'batman_adv' (000000000a64debf): kobject_uevent_env: filter function caused the event to drop! [ 666.033269][T10755] kobject: 'batman_adv' (000000000a64debf): kobject_cleanup, parent 000000004015532d [ 666.033285][T10755] kobject: 'batman_adv' (000000000a64debf): calling ktype release [ 666.050023][T10868] Code: 6e 81 c7 00 f1 f1 f1 f1 c7 40 04 00 04 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 a0 a5 03 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e 9f 02 00 00 4c 8b ad 68 ff [ 666.050383][T10755] kobject: (000000000a64debf): dynamic_kobj_release [ 666.069743][ T3895] kobject: 'loop5' (000000004af35fac): kobject_uevent_env [ 666.091723][T10756] kobject: '0:51' (00000000162b658f): kobject_add_internal: parent: 'bdi', set: 'devices' [ 666.105559][T10868] RSP: 0018:ffff88805be97a30 EFLAGS: 00010246 [ 666.111888][T10756] kobject: '0:51' (00000000162b658f): kobject_uevent_env [ 666.125195][ T3895] kobject: 'loop5' (000000004af35fac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 666.127121][T10803] kobject: '0:52' (00000000c808ba6b): kobject_add_internal: parent: 'bdi', set: 'devices' [ 666.140076][T10868] RAX: 0000000000000000 RBX: ffff88805be97aa8 RCX: ffffc9000cd10000 [ 666.148287][T10755] kobject: 'batman_adv': free name [ 666.164366][T10896] fuse: Invalid rootmode [ 666.169883][T10756] kobject: '0:51' (00000000162b658f): fill_kobj_path: path = '/devices/virtual/bdi/0:51' [ 666.179890][T10755] kobject: 'rx-0' (000000005cbd3abc): kobject_cleanup, parent 000000000bd346a4 [ 666.186875][T10868] RDX: 000000000001161f RSI: ffffffff816e8ab0 RDI: 0000000000000000 [ 666.190348][T10755] kobject: 'rx-0' (000000005cbd3abc): auto cleanup 'remove' event [ 666.206014][T10803] kobject: '0:52' (00000000c808ba6b): kobject_uevent_env [ 666.215484][T10755] kobject: 'rx-0' (000000005cbd3abc): kobject_uevent_env [ 666.224668][T10803] kobject: '0:52' (00000000c808ba6b): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 666.236356][T10868] RBP: ffff88805be97ad0 R08: ffff88809af2a040 R09: ffffed101380e3db [ 666.239086][T10755] kobject: 'rx-0' (000000005cbd3abc): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' 13:58:53 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="f02d2976931fb58095420744e49e3953ae51f7a00e3f5d9bd971cf74598d76108137828f53073d915738ef1e6bb579974d11209dafb7bc177686fd03822d6e9506d60323458a4172d695a8adfda6417c35a837a8c4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 13:58:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x1020}}) [ 666.245477][T10868] R10: ffffed101380e3da R11: 0000000000000003 R12: 0000000000000001 [ 666.268843][T10755] kobject: 'rx-0' (000000005cbd3abc): auto cleanup kobject_del [ 666.282604][T10755] kobject: 'rx-0' (000000005cbd3abc): calling ktype release [ 666.289122][ T3895] kobject: 'loop5' (000000004af35fac): kobject_uevent_env [ 666.290117][T10755] kobject: 'rx-0': free name [ 666.300408][ T6554] kobject: '0:51' (00000000162b658f): kobject_uevent_env [ 666.301931][T10755] kobject: 'tx-0' (0000000037810420): kobject_cleanup, parent 000000000bd346a4 [ 666.315976][ T3895] kobject: 'loop5' (000000004af35fac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 666.328835][ T9188] kobject: '0:52' (00000000c808ba6b): kobject_uevent_env [ 666.330971][T10868] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 666.341524][T10755] kobject: 'tx-0' (0000000037810420): auto cleanup 'remove' event [ 666.344569][ T6554] kobject: '0:51' (00000000162b658f): fill_kobj_path: path = '/devices/virtual/bdi/0:51' [ 666.352994][ T9188] kobject: '0:52' (00000000c808ba6b): fill_kobj_path: path = '/devices/virtual/bdi/0:52' [ 666.372791][T10755] kobject: 'tx-0' (0000000037810420): kobject_uevent_env [ 666.381911][T10901] fuse: Invalid rootmode [ 666.386532][T10755] kobject: 'tx-0' (0000000037810420): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 666.396930][T10904] kobject: '0:53' (0000000044cc38b9): kobject_add_internal: parent: 'bdi', set: 'devices' [ 666.399892][T10755] kobject: 'tx-0' (0000000037810420): auto cleanup kobject_del [ 666.411723][ T6554] kobject: '0:51' (00000000162b658f): kobject_cleanup, parent 000000004015532d [ 666.417285][ T9188] kobject: '0:52' (00000000c808ba6b): kobject_cleanup, parent 000000004015532d [ 666.431030][T10907] kasan: CONFIG_KASAN_INLINE enabled [ 666.438184][T10868] FS: 00007f3193d40700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 666.438633][T10755] kobject: 'tx-0' (0000000037810420): calling ktype release [ 666.451599][ T6554] kobject: '0:51' (00000000162b658f): calling ktype release [ 666.456842][ T9188] kobject: '0:52' (00000000c808ba6b): calling ktype release [ 666.461951][T10907] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 666.471511][T10755] kobject: 'tx-0': free name [ 666.482023][ T9188] kobject: '0:52': free name [ 666.485858][ T6554] kobject: '0:51': free name [ 666.486800][T10755] kobject: 'queues' (000000000bd346a4): kobject_cleanup, parent 000000004015532d [ 666.498033][ T3895] kobject: 'loop5' (000000004af35fac): kobject_uevent_env [ 666.501359][T10755] kobject: 'queues' (000000000bd346a4): calling ktype release [ 666.512014][ T3895] kobject: 'loop5' (000000004af35fac): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 666.515196][T10755] kobject: 'queues' (000000000bd346a4): kset_release [ 666.528924][T10904] kobject: '0:53' (0000000044cc38b9): kobject_uevent_env [ 666.532118][T10755] kobject: 'queues': free name [ 666.544587][T10755] kobject: 'eql' (00000000c0f53310): kobject_uevent_env [ 666.552120][T10755] kobject: 'eql' (00000000c0f53310): fill_kobj_path: path = '/devices/virtual/net/eql' [ 666.552832][T10868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 666.563169][T10907] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 666.575284][T10907] CPU: 1 PID: 10907 Comm: syz-executor.3 Tainted: G D 5.3.0-rc4-next-20190814 #66 [ 666.580114][T10904] kobject: '0:53' (0000000044cc38b9): fill_kobj_path: path = '/devices/virtual/bdi/0:53' [ 666.585781][T10907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.585802][T10907] RIP: 0010:map_id_range_down+0x87/0x370 [ 666.585817][T10907] Code: 6e 81 c7 00 f1 f1 f1 f1 c7 40 04 00 04 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 a0 a5 03 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e 9f 02 00 00 4c 8b ad 68 ff [ 666.585824][T10907] RSP: 0018:ffff888089627a30 EFLAGS: 00010246 [ 666.585834][T10907] RAX: 0000000000000000 RBX: ffff888089627aa8 RCX: ffffc9000d514000 [ 666.585842][T10907] RDX: 000000000000a164 RSI: ffffffff816e8ab0 RDI: 0000000000000000 [ 666.585851][T10907] RBP: ffff888089627ad0 R08: ffff888087a88500 R09: ffffed1014161343 [ 666.585859][T10907] R10: ffffed1014161342 R11: 0000000000000003 R12: 0000000000000001 [ 666.585866][T10907] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 666.585877][T10907] FS: 00007f3193cbc700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 666.585896][T10907] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 666.605889][T10868] CR2: 00007f3193cbbdb8 CR3: 0000000097eff000 CR4: 00000000001406f0 [ 666.611394][T10907] CR2: 0000000000625208 CR3: 0000000097eff000 CR4: 00000000001406e0 [ 666.640916][T10868] Kernel panic - not syncing: Fatal exception [ 666.645055][T10907] DR0: 0000000000002e00 DR1: 0000000000000000 DR2: 0000000000000000 [ 666.722373][T10907] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 666.730362][T10907] Call Trace: [ 666.733670][T10907] ? __put_user_ns+0x70/0x70 [ 666.738256][T10907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.744489][T10907] ? fs_parse+0x53c/0x1080 [ 666.748899][T10907] make_kuid+0x23/0x30 [ 666.752960][T10907] fuse_parse_param+0x2cb/0x750 [ 666.757819][T10907] ? process_init_reply+0x1650/0x1650 [ 666.763191][T10907] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 666.768909][T10907] ? __lookup_constant+0xd6/0x100 [ 666.773935][T10907] ? process_init_reply+0x1650/0x1650 [ 666.779329][T10907] vfs_parse_fs_param+0x2ca/0x540 [ 666.784356][T10907] vfs_parse_fs_string+0x105/0x170 [ 666.789464][T10907] ? vfs_parse_fs_param+0x540/0x540 [ 666.794652][T10907] ? kasan_unpoison_shadow+0x35/0x50 [ 666.799932][T10907] ? kasan_kmalloc+0x9/0x10 [ 666.804426][T10907] ? kmem_cache_alloc_trace+0x346/0x790 [ 666.809970][T10907] generic_parse_monolithic+0x181/0x200 [ 666.815518][T10907] ? vfs_parse_fs_string+0x170/0x170 [ 666.820820][T10907] ? fuse_dev_alloc+0x410/0x410 [ 666.825679][T10907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.831913][T10907] ? alloc_fs_context+0x434/0x6d0 [ 666.836929][T10907] ? vfs_parse_fs_string+0x170/0x170 [ 666.842207][T10907] parse_monolithic_mount_data+0x69/0x90 [ 666.847840][T10907] do_mount+0x924/0x1c30 [ 666.852079][T10907] ? copy_mount_string+0x40/0x40 [ 666.857017][T10907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.863248][T10907] ? copy_mount_options+0x2e8/0x3f0 [ 666.868442][T10907] ksys_mount+0xdb/0x150 [ 666.872682][T10907] __x64_sys_mount+0xbe/0x150 [ 666.877358][T10907] do_syscall_64+0xfa/0x760 [ 666.881858][T10907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.887745][T10907] RIP: 0033:0x459829 [ 666.891633][T10907] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 666.911241][T10907] RSP: 002b:00007f3193cbbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 666.919661][T10907] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459829 [ 666.927639][T10907] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 666.935617][T10907] RBP: 000000000075c1c0 R08: 0000000020000500 R09: 0000000000000000 [ 666.943580][T10907] R10: 0000000000000020 R11: 0000000000000246 R12: 00007f3193cbc6d4 [ 666.951544][T10907] R13: 00000000004c5e2b R14: 00000000004da938 R15: 00000000ffffffff [ 666.959513][T10907] Modules linked in: [ 666.964526][T10868] Kernel Offset: disabled [ 666.968851][T10868] Rebooting in 86400 seconds..