AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwBv7844CIRAGYbB3fWcy9z+sNGhobFIFwsffGAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAm9/95f/E1DiTzL02lp5HkrVTY+vU2Ds3jv4wvn4NAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXOzPSwqEQBBEwZzxv5O+/2ElQc8gQgQ0PKqoRQMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBFv/vl/8TUOJPMnTaWjkeStavG1lVj70Hj6MF4+zcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXOzcP28cRRQA8Hd7t5c/gDAGuTCgIFFAQ+xLSEgJBcii4CMgWc45GC4EEhckskBuoEKu0yAoEUICmS7fIXUspQldChdGogbt3u5lkxhyiszuEv9+0uy8Pa9m3uydLD/P2gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAafedeCkp4m52mBnH5Wu39jZWsn7ngT5zY+v2fNayuPOoib55++CTb7eXqycn5ionX9WfDAAAAIdDt6zvI+JOur2U9clMXv+n5TVZzf/9M+O4rOcfrPt39jaOFl+aL+v/3369+8JkopnxPNmgq2uj4eLDqfT+oyW23rOPvKKX3/n8dy/d/A1J3t98fjfN72fn25s33+3n4ZE6sgUAHsfJsi+C8uehrB80mRgAh0avUniX9X93ptmcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOqwuxlPlXEnIuZ79+LMzt7Gyn79ja3b82U7e/36VnXMbIg0IlbXRsO0xrW03ZWr1z5ZHo2Gl+sPTkREc7MXwYdTXBPx79cUH89obhX/HHTakUajQVK8P23J5yCD8rN38CM39A0JAIAnVlq0rK6/k24vZa91ZiP++uH++v+1ShxT1v93Pzp7qzpXtf4f1LbC9ltYv/jZwpWr195Yu7h8YXhh+OmbpwZvDU6fO3Pm3EJ2rxYXViMZLjadJgAAAP9j/aJV6/9k9uH9/+OVOKas/z//bvBlda6u+n9f9zb9ms4EAADgMOpPoude+fOPzj5XdPr9+GJ5ff3yYHycnJ8aH2tN9zEdKVq1/u/ONp0VAAAAUIfdzc59+//nK3FMuf//9I8v/lwdsxsRxyIuRcTw5Mql0fn6ltNqdfyhcj5Rv+mVAgAA0JRjRavu/6f58//J5JGHJCJef3Ucl//rapr6v/ve1z9V56o+/3+6viW2UjI3vh95PxfRm2s6IwAAAJ5kR4uWFfu/p9tLH/9y/IO+5/8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6vZ3AAAA//+pzDYD") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f000001fd80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 10:16:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1c916, &(0x7f0000000140)=ANY=[@ANYBLOB='nobarrier,noblock_validity,discard,grpquota,noinit_itable,resgid=', @ANYRESHEX=0xee01, @ANYBLOB=',jqfmt=vfsold,noauto_da_alloc,resgid=', @ANYRESHEX=0xee00, @ANYBLOB], 0x1b, 0x4da, &(0x7f0000000a40)="$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") r0 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 2161.447359][ T2617] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2161.614531][ T3296] loop2: detected capacity change from 0 to 2048 [ 2161.682345][ T3296] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 2161.736004][ T3296] UDF-fs: Scanning with blocksize 512 failed [ 2161.764351][ T3296] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 2161.892818][ T28] audit: type=1804 audit(1707300968.214:1451): pid=3296 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name=2F726F6F742F73797A6B616C6C65722D74657374646972333636363434383536372F73797A6B616C6C65722E6A564E3034432F3439372F2E022F627573 dev="loop2" ino=851 res=1 errno=0 [ 2161.994282][ T28] audit: type=1800 audit(1707300968.214:1452): pid=3296 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="loop2" ino=851 res=0 errno=0 [ 2162.174333][ T3302] loop1: detected capacity change from 0 to 512 10:16:08 executing program 2: syz_mount_image$udf(&(0x7f00000000c0), &(0x7f0000000140)='.\x02\x00', 0x0, &(0x7f0000000a00)=ANY=[], 0x5, 0xc3b, &(0x7f0000001940)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x3) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x125000, 0x0) sendfile(r0, r1, 0x0, 0x1dd00) [ 2162.306589][ T3302] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 2162.366299][ T3302] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 2162.440101][ T3302] [EXT4 FS bs=4096, gc=1, bpg=3008, ipg=32, mo=4015e018, mo2=0000] [ 2162.485446][ T3302] EXT4-fs (loop1): 1 truncate cleaned up [ 2162.508572][ T2812] Quota error (device loop1): free_dqentry: Quota structure has offset to other block (1) than it should (5) [ 2162.551299][ T28] audit: type=1804 audit(1707300968.874:1453): pid=3312 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir4027814173/syzkaller.AN5BHE/391/bus" dev="sda1" ino=1935 res=1 errno=0 [ 2162.552507][ T3302] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2162.818920][ T3302] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. 10:16:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1c916, &(0x7f0000000140)=ANY=[@ANYBLOB='nobarrier,noblock_validity,discard,grpquota,noinit_itable,resgid=', @ANYRESHEX=0xee01, @ANYBLOB=',jqfmt=vfsold,noauto_da_alloc,resgid=', @ANYRESHEX=0xee00, @ANYBLOB], 0x1b, 0x4da, &(0x7f0000000a40)="$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") r0 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 2162.977880][ T2617] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2163.107526][ T3323] loop2: detected capacity change from 0 to 2048 [ 2163.165120][ T3323] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 2163.194251][ T3323] UDF-fs: Scanning with blocksize 512 failed [ 2163.212785][ T3323] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 10:16:09 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="d9", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) open$dir(&(0x7f0000000000)='./bus\x00', 0x800, 0x1) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) r2 = open(&(0x7f0000000100)='./bus\x00', 0x109042, 0x0) fallocate(r2, 0x0, 0x91000000, 0x10000101) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000180)='([\x00\xc1:\x95\x80F) 1 [ 2178.356266][ T1362] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 2178.369138][ T1362] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 2178.416332][ T1362] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 2178.441395][ T1362] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 2178.472517][ T1362] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 10:16:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 1) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2178.786484][ T1362] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 2178.803548][ T1362] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 2178.832369][ T1362] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 2178.852041][ T1362] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 2178.906195][ T1362] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 2178.939480][ T1362] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 2179.254070][ T3549] loop3: detected capacity change from 0 to 512 [ 2179.376416][T27368] hsr_slave_0: left promiscuous mode [ 2179.393717][T27368] hsr_slave_1: left promiscuous mode [ 2179.404090][ T3549] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 2179.457099][T27368] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2179.464657][T27368] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2179.476990][ T3549] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 2179.530399][T27368] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2179.597359][ T3549] EXT4-fs (loop3): 1 truncate cleaned up [ 2179.603184][T27368] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2179.615007][ T3549] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2179.630025][T22053] Quota error (device loop3): free_dqentry: Quota structure has offset to other block (1) than it should (5) [ 2179.680989][T27368] bridge_slave_1: left allmulticast mode [ 2179.736485][T27368] bridge_slave_1: left promiscuous mode [ 2179.742359][T27368] bridge0: port 2(bridge_slave_1) entered disabled state [ 2179.795833][T27368] bridge_slave_0: left allmulticast mode [ 2179.801654][T27368] bridge_slave_0: left promiscuous mode [ 2179.848675][T27368] bridge0: port 1(bridge_slave_0) entered disabled state [ 2179.908683][T27368] veth1_macvtap: left promiscuous mode [ 2179.914315][T27368] veth0_macvtap: left promiscuous mode [ 2179.932513][ T28] audit: type=1804 audit(1707300986.254:1501): pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3596096293/syzkaller.vLqPfq/14/file0/bus" dev="loop3" ino=16 res=1 errno=0 [ 2179.956253][T27368] veth1_vlan: left promiscuous mode [ 2179.964946][T27368] veth0_vlan: left promiscuous mode [ 2180.120115][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2180.187002][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata 10:16:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 2) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2180.323244][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2180.431549][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2180.487410][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2180.576333][ T1362] Bluetooth: hci0: command 0x0409 tx timeout [ 2180.701407][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2180.795020][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2180.795387][ T3566] FAULT_INJECTION: forcing a failure. [ 2180.795387][ T3566] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 2180.841651][ T3566] CPU: 1 PID: 3566 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2180.852062][ T3566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2180.862167][ T3566] Call Trace: [ 2180.865490][ T3566] [ 2180.868430][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2180.868463][ T3566] dump_stack_lvl+0x1e7/0x2e0 [ 2180.887241][ T3566] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2180.892491][ T3566] ? __pfx__printk+0x10/0x10 [ 2180.897129][ T3566] ? __pfx_lock_release+0x10/0x10 [ 2180.902233][ T3566] should_fail_ex+0x3ae/0x4e0 [ 2180.907031][ T3566] _copy_from_user+0x2f/0xe0 [ 2180.911659][ T3566] memdup_user+0x64/0xc0 [ 2180.915928][ T3566] strndup_user+0x68/0xc0 [ 2180.920271][ T3566] __se_sys_mount+0x9f/0x3c0 [ 2180.924879][ T3566] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2180.930883][ T3566] ? __pfx___se_sys_mount+0x10/0x10 [ 2180.936101][ T3566] ? do_syscall_64+0x108/0x240 [ 2180.940887][ T3566] ? __x64_sys_mount+0x20/0xc0 [ 2180.945665][ T3566] do_syscall_64+0xf9/0x240 [ 2180.950200][ T3566] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2180.956115][ T3566] RIP: 0033:0x7f681447dda9 [ 2180.960545][ T3566] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2180.980178][ T3566] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2180.988614][ T3566] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2180.996618][ T3566] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2181.004621][ T3566] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2181.012615][ T3566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2181.020599][ T3566] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2181.028597][ T3566] 10:16:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) (fail_nth: 1) [ 2181.073822][ T1362] Bluetooth: hci3: command 0x0409 tx timeout [ 2181.089200][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2181.160318][ T3545] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata 10:16:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 3) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2181.289285][ T3549] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. 10:16:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1c916, &(0x7f00000001c0)=ANY=[@ANYBLOB='nobarrier,noblock_validity,discard,barrier=0x0000000000000003,noinit_itable,resgid=', @ANYRESHEX=0xee01, @ANYBLOB=',jqfmt=vfsold,resgid=', @ANYRESHEX=0xee01, @ANYBLOB=',resgid=', @ANYRESHEX=0xee00, @ANYBLOB="320084ce298b5f64e179aa406df04c11f3f638b62bd6bbc452faa6845f6912e56c415668b62cbc94c801ea12ac063d5ea4246772f3da8bb46b8d0a86a91c906c3ba200"/80], 0x1b, 0x4c5, &(0x7f0000000ec0)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14957e, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x147042, 0x0) ftruncate(r1, 0x2007fff) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8088e3ad122bc192, 0x4002011, r0, 0x0) open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000520c0)={0x0, [], 0x0, "737b383178b698"}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) writev(r2, &(0x7f0000001540)=[{&(0x7f0000000340)='8', 0x1}], 0x1) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004e740)={0x0, 0x0, "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", "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"}) r3 = open(&(0x7f0000000100)='.\x00', 0x591002, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x48, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private2}}}, 0x48) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x1a404ac, &(0x7f00000030c0)=ANY=[@ANYBLOB="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", @ANYRES8, @ANYRESHEX, @ANYRES64, @ANYRESOCT, @ANYRESHEX, @ANYRESHEX, @ANYRESOCT, @ANYBLOB="6c587b81896b2350369ee8d83f977b696703527759a674c6d61cd929ebc6e5004d4c47f0144ed8a532c6b3cb877bdfee3e2d4e5ce1f0dd5b5439d7edeb457c8419b1e22974eafe8e727b9a2445a370734209a6e4a8445fa348b9dd7ff9706a2536df371fa6b263533bf021bb179509a910966d4474218e874dba3b22ff70deda308f5903f85b1eab3ec4e539dc3b71462b66785ec2cd88d2150c445cb1968939219a3dceea5fdfb222114769468721f21fd9e7e1de2af80add0700000052a639b041d51d239be0fd1e176150e52139d4823706e8639b457cac96121685c22f843fce087365ec1bfcdafe631dc7031fdb30c55a9ec5e9e7c62817f7387369fc2719a3c653294e291000f9d4c370285b31ed2708d5ac069a21", @ANYRES64=r3], 0xfe, 0x0, &(0x7f0000000000)) r4 = open(&(0x7f0000000100)='.\x00', 0x591002, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x48, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private2}}}, 0x48) open(0x0, 0x0, 0x0) [ 2181.407485][ T3549] EXT4-fs (loop3): pa ffff88807a1ccd90: logic 2, phys. 50, len 5 [ 2181.563565][T27368] team0 (unregistering): Port device team_slave_1 removed [ 2181.595784][T27368] team0 (unregistering): Port device team_slave_0 removed [ 2181.648175][T27368] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2181.734790][T27368] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2181.759382][ T3571] FAULT_INJECTION: forcing a failure. [ 2181.759382][ T3571] name failslab, interval 1, probability 0, space 0, times 0 [ 2181.792496][ T3049] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2181.806152][ T3571] CPU: 1 PID: 3571 Comm: syz-executor.1 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2181.816554][ T3571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2181.826654][ T3571] Call Trace: [ 2181.829980][ T3571] [ 2181.832951][ T3571] dump_stack_lvl+0x1e7/0x2e0 [ 2181.837696][ T3571] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2181.842944][ T3571] ? __pfx__printk+0x10/0x10 [ 2181.847594][ T3571] ? __pfx___might_resched+0x10/0x10 [ 2181.852925][ T3571] should_fail_ex+0x3ae/0x4e0 [ 2181.857659][ T3571] ? fuse_dev_do_write+0x574/0x54f0 [ 2181.862937][ T3571] should_failslab+0x9/0x20 [ 2181.867493][ T3571] kmalloc_trace+0x76/0x360 [ 2181.868303][ T3572] FAULT_INJECTION: forcing a failure. [ 2181.868303][ T3572] name failslab, interval 1, probability 0, space 0, times 0 [ 2181.872040][ T3571] ? fuse_dev_do_write+0x2c4/0x54f0 [ 2181.872085][ T3571] fuse_dev_do_write+0x574/0x54f0 [ 2181.894986][ T3571] ? mark_lock+0x9a/0x350 [ 2181.899370][ T3571] ? __pfx_validate_chain+0x10/0x10 [ 2181.904629][ T3571] ? __pfx_fuse_dev_do_write+0x10/0x10 [ 2181.910183][ T3571] ? __pfx_lock_acquire+0x10/0x10 [ 2181.915269][ T3571] ? get_pid_task+0x23/0x1f0 [ 2181.919892][ T3571] ? mark_lock+0x9a/0x350 [ 2181.924244][ T3571] fuse_dev_write+0x149/0x1d0 [ 2181.928944][ T3571] ? __pfx_fuse_dev_write+0x10/0x10 [ 2181.934169][ T3571] ? bpf_lsm_file_permission+0x9/0x10 [ 2181.939564][ T3571] ? security_file_permission+0x7f/0xa0 [ 2181.945168][ T3571] vfs_write+0xa81/0xcb0 [ 2181.949428][ T3571] ? __pfx_lock_release+0x10/0x10 [ 2181.954504][ T3571] ? __pfx_vfs_write+0x10/0x10 [ 2181.959317][ T3571] ? __fget_files+0x3f4/0x470 [ 2181.964066][ T3571] ? __fdget_pos+0x1a1/0x320 [ 2181.968683][ T3571] ksys_write+0x1a0/0x2c0 [ 2181.973037][ T3571] ? __pfx_ksys_write+0x10/0x10 [ 2181.977920][ T3571] ? do_syscall_64+0x108/0x240 [ 2181.982712][ T3571] ? do_syscall_64+0xb4/0x240 [ 2181.987412][ T3571] do_syscall_64+0xf9/0x240 [ 2181.991943][ T3571] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2181.997859][ T3571] RIP: 0033:0x7f75e427dda9 [ 2182.002284][ T3571] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2182.021924][ T3571] RSP: 002b:00007f75e4fb00c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2182.030374][ T3571] RAX: ffffffffffffffda RBX: 00007f75e43ac050 RCX: 00007f75e427dda9 [ 2182.038364][ T3571] RDX: 0000000000000029 RSI: 00000000200043c0 RDI: 0000000000000003 [ 2182.046350][ T3571] RBP: 00007f75e4fb0120 R08: 0000000000000000 R09: 0000000000000000 [ 2182.054350][ T3571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2182.062333][ T3571] R13: 000000000000006e R14: 00007f75e43ac050 R15: 00007ffc18242d88 [ 2182.070331][ T3571] [ 2182.088348][ T3572] CPU: 0 PID: 3572 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2182.098753][ T3572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2182.108848][ T3572] Call Trace: [ 2182.112158][ T3572] [ 2182.115121][ T3572] dump_stack_lvl+0x1e7/0x2e0 [ 2182.119855][ T3572] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2182.125112][ T3572] ? __pfx__printk+0x10/0x10 [ 2182.129755][ T3572] ? __pfx___might_resched+0x10/0x10 [ 2182.135089][ T3572] should_fail_ex+0x3ae/0x4e0 [ 2182.139819][ T3572] ? __se_sys_mount+0x15a/0x3c0 [ 2182.144709][ T3572] should_failslab+0x9/0x20 [ 2182.149255][ T3572] kmalloc_trace+0x76/0x360 [ 2182.153805][ T3572] ? memdup_user+0x9f/0xc0 [ 2182.158270][ T3572] __se_sys_mount+0x15a/0x3c0 [ 2182.162987][ T3572] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2182.169022][ T3572] ? __pfx___se_sys_mount+0x10/0x10 [ 2182.174262][ T3572] ? do_syscall_64+0x108/0x240 [ 2182.179078][ T3572] ? __x64_sys_mount+0x20/0xc0 [ 2182.183893][ T3572] do_syscall_64+0xf9/0x240 [ 2182.188451][ T3572] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2182.194411][ T3572] RIP: 0033:0x7f681447dda9 [ 2182.198852][ T3572] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2182.218583][ T3572] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2182.227131][ T3572] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2182.235125][ T3572] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2182.243113][ T3572] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2182.251103][ T3572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2182.259090][ T3572] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2182.267093][ T3572] 10:16:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 4) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) (fail_nth: 2) [ 2182.667336][ T1362] Bluetooth: hci0: command 0x041b tx timeout [ 2182.689610][T27368] bond0 (unregistering): Released all slaves [ 2182.692506][ T3576] loop3: detected capacity change from 0 to 512 [ 2182.763139][ T3576] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 2182.807658][ T3576] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 2182.923062][ T3576] EXT4-fs (loop3): 1 truncate cleaned up [ 2182.934568][ T3581] FAULT_INJECTION: forcing a failure. [ 2182.934568][ T3581] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2182.946651][ T3576] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2182.974987][T22053] Quota error (device loop3): free_dqentry: Quota structure has offset to other block (1) than it should (5) [ 2182.996785][ T3581] CPU: 1 PID: 3581 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2183.007182][ T3581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2183.017262][ T3581] Call Trace: [ 2183.020554][ T3581] [ 2183.023499][ T3581] dump_stack_lvl+0x1e7/0x2e0 [ 2183.028209][ T3581] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2183.033426][ T3581] ? __pfx__printk+0x10/0x10 [ 2183.038038][ T3581] ? __pfx_lock_release+0x10/0x10 [ 2183.043118][ T3581] should_fail_ex+0x3ae/0x4e0 [ 2183.047848][ T3581] _copy_from_user+0x2f/0xe0 [ 2183.052472][ T3581] __se_sys_mount+0x17d/0x3c0 [ 2183.057199][ T3581] ? __pfx___se_sys_mount+0x10/0x10 [ 2183.062448][ T3581] ? do_syscall_64+0x108/0x240 [ 2183.067262][ T3581] ? __x64_sys_mount+0x20/0xc0 [ 2183.072045][ T3581] do_syscall_64+0xf9/0x240 [ 2183.076572][ T3581] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2183.082494][ T3581] RIP: 0033:0x7f681447dda9 [ 2183.086939][ T3581] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2183.106577][ T3581] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2183.115018][ T3581] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2183.123010][ T3581] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2183.130996][ T3581] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2183.138983][ T3581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2183.146967][ T3581] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2183.154967][ T3581] [ 2183.195320][ T1362] Bluetooth: hci3: command 0x041b tx timeout [ 2183.361740][ T28] audit: type=1804 audit(1707300989.684:1502): pid=3588 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3596096293/syzkaller.vLqPfq/15/file0/bus" dev="loop3" ino=16 res=1 errno=0 [ 2183.459039][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2183.583194][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2183.679497][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2183.789605][ T3538] chnl_net:caif_netlink_parms(): no params data found [ 2183.792711][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata 10:16:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 5) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2183.875123][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2183.902518][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2183.918050][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2183.934530][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2183.958008][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2184.003764][ T3575] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2184.231507][ T3588] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. [ 2184.381639][ T3541] chnl_net:caif_netlink_parms(): no params data found [ 2184.628993][ T3575] EXT4-fs (loop3): pa ffff88807a36f5d0: logic 2, phys. 50, len 5 10:16:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1c916, &(0x7f00000001c0)=ANY=[@ANYBLOB='nobarrier,noblock_validity,discard,barrier=0x0000000000000003,noinit_itable,resgid=', @ANYRESHEX=0xee01, @ANYBLOB=',jqfmt=vfsold,resgid=', @ANYRESHEX=0xee01, @ANYBLOB=',resgid=', @ANYRESHEX=0xee00, @ANYBLOB="320084ce298b5f64e179aa406df04c11f3f638b62bd6bbc452faa6845f6912e56c415668b62cbc94c801ea12ac063d5ea4246772f3da8bb46b8d0a86a91c906c3ba200"/80], 0x1b, 0x4c5, &(0x7f0000000ec0)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14957e, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x147042, 0x0) ftruncate(r1, 0x2007fff) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8088e3ad122bc192, 0x4002011, r0, 0x0) open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000520c0)={0x0, [], 0x0, "737b383178b698"}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced_recursive\x00', 0x275a, 0x0) writev(r2, &(0x7f0000001540)=[{&(0x7f0000000340)='8', 0x1}], 0x1) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004e740)={0x0, 0x0, "38423c5a341094ea7d0eb2fc5a774358b51383f0564b0df6e85b348683144b4f9ef6f2234ba41dba7263c8d80623860f21165411cfda9add33779def5d44560038aa28ceb53de2b9c7274c03a14c4e99fff42c79fe24085fd133f5a382244546d86d8a700b1e3792c8d15a7b419fd7f194123734d966d4ac7c6d9ebfce38131614e920ca54f99265064300c6b68fb2dae871f77e53ce1de80ecd93d76abb710f1bb1cbd167ce8d03a80a3e53fe9e72edc75d30be6aad9659d9fbcf023c58c045708c233b7d8418dae5a82148453e6453e3fe46499a3e6a9d64f79a0ef826095e97e513e8ba17c3bf58d9348ea18e86dbccbd7cafdacf9c84367f5de4d8ee6024", "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"}) r3 = open(&(0x7f0000000100)='.\x00', 0x591002, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x48, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private2}}}, 0x48) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x1a404ac, &(0x7f00000030c0)=ANY=[@ANYBLOB="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", @ANYRES8, @ANYRESHEX, @ANYRES64, @ANYRESOCT, @ANYRESHEX, @ANYRESHEX, @ANYRESOCT, @ANYBLOB="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", @ANYRES64=r3], 0xfe, 0x0, &(0x7f0000000000)) r4 = open(&(0x7f0000000100)='.\x00', 0x591002, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000001c0)={0x3, 0x48, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @private2}}}, 0x48) open(0x0, 0x0, 0x0) [ 2184.753378][ T1362] Bluetooth: hci0: command 0x040f tx timeout [ 2184.765761][ T3538] bridge0: port 1(bridge_slave_0) entered blocking state [ 2184.796997][ T3538] bridge0: port 1(bridge_slave_0) entered disabled state [ 2184.846385][ T3538] bridge_slave_0: entered allmulticast mode [ 2184.890165][ T3538] bridge_slave_0: entered promiscuous mode [ 2184.916510][ T3616] FAULT_INJECTION: forcing a failure. [ 2184.916510][ T3616] name failslab, interval 1, probability 0, space 0, times 0 [ 2184.982813][ T3538] bridge0: port 2(bridge_slave_1) entered blocking state [ 2185.024949][ T3538] bridge0: port 2(bridge_slave_1) entered disabled state [ 2185.031662][ T3049] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2185.041764][ T3616] CPU: 1 PID: 3616 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2185.052159][ T3616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2185.056317][ T3538] bridge_slave_1: entered allmulticast mode [ 2185.062235][ T3616] Call Trace: [ 2185.062249][ T3616] [ 2185.062260][ T3616] dump_stack_lvl+0x1e7/0x2e0 [ 2185.079156][ T3616] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2185.084405][ T3616] ? __pfx__printk+0x10/0x10 [ 2185.089042][ T3616] ? __pfx___might_resched+0x10/0x10 [ 2185.094374][ T3616] ? irqentry_exit+0x63/0x90 [ 2185.099013][ T3616] should_fail_ex+0x3ae/0x4e0 [ 2185.103717][ T3616] ? getname_flags+0xbc/0x4f0 [ 2185.108414][ T3616] should_failslab+0x9/0x20 [ 2185.112943][ T3616] kmem_cache_alloc+0x77/0x340 [ 2185.117734][ T3616] getname_flags+0xbc/0x4f0 [ 2185.122266][ T3616] ? rcuref_put_slowpath+0x2c1/0x340 [ 2185.127583][ T3616] user_path_at_empty+0x2c/0x60 [ 2185.132451][ T3616] __se_sys_mount+0x29a/0x3c0 [ 2185.137151][ T3616] ? __pfx___se_sys_mount+0x10/0x10 [ 2185.142366][ T3616] ? do_syscall_64+0x108/0x240 [ 2185.147161][ T3616] ? __x64_sys_mount+0x20/0xc0 [ 2185.151963][ T3616] do_syscall_64+0xf9/0x240 [ 2185.156507][ T3616] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2185.162427][ T3616] RIP: 0033:0x7f681447dda9 [ 2185.166866][ T3616] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2185.186495][ T3616] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2185.194931][ T3616] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2185.202917][ T3616] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2185.210900][ T3616] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2185.218883][ T3616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2185.226864][ T3616] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2185.234862][ T3616] [ 2185.243491][ T3538] bridge_slave_1: entered promiscuous mode [ 2185.276011][ T1362] Bluetooth: hci3: command 0x040f tx timeout 10:16:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 6) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2185.482520][ T3541] bridge0: port 1(bridge_slave_0) entered blocking state [ 2185.510084][ T3541] bridge0: port 1(bridge_slave_0) entered disabled state 10:16:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x10, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2185.532798][ T3541] bridge_slave_0: entered allmulticast mode [ 2185.596151][ T3541] bridge_slave_0: entered promiscuous mode [ 2185.637841][ T3541] bridge0: port 2(bridge_slave_1) entered blocking state [ 2185.645061][ T3541] bridge0: port 2(bridge_slave_1) entered disabled state [ 2185.707378][ T3621] loop3: detected capacity change from 0 to 512 [ 2185.716903][ T3541] bridge_slave_1: entered allmulticast mode [ 2185.727815][ T3541] bridge_slave_1: entered promiscuous mode [ 2185.755721][ T3621] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 2185.779552][ T3621] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 2185.834204][ T3621] EXT4-fs (loop3): 1 truncate cleaned up [ 2185.846478][ T3621] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2185.861183][ T2812] Quota error (device loop3): free_dqentry: Quota structure has offset to other block (1) than it should (5) [ 2185.897893][ T3538] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2185.919237][ T3626] FAULT_INJECTION: forcing a failure. [ 2185.919237][ T3626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2185.990259][ T3538] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2186.008814][ T3626] CPU: 1 PID: 3626 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2186.019239][ T3626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2186.029349][ T3626] Call Trace: [ 2186.032677][ T3626] [ 2186.035645][ T3626] dump_stack_lvl+0x1e7/0x2e0 [ 2186.040386][ T3626] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2186.045650][ T3626] ? __pfx__printk+0x10/0x10 [ 2186.050307][ T3626] should_fail_ex+0x3ae/0x4e0 [ 2186.055043][ T3626] strncpy_from_user+0x36/0x2f0 [ 2186.059962][ T3626] getname_flags+0xf9/0x4f0 [ 2186.064533][ T3626] user_path_at_empty+0x2c/0x60 [ 2186.069442][ T3626] __se_sys_mount+0x29a/0x3c0 [ 2186.074177][ T3626] ? __pfx___se_sys_mount+0x10/0x10 [ 2186.079420][ T3626] ? do_syscall_64+0x108/0x240 [ 2186.084212][ T3626] ? __x64_sys_mount+0x20/0xc0 [ 2186.088998][ T3626] do_syscall_64+0xf9/0x240 [ 2186.093528][ T3626] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2186.099444][ T3626] RIP: 0033:0x7f681447dda9 [ 2186.103878][ T3626] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2186.123501][ T3626] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2186.131937][ T3626] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2186.139922][ T3626] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2186.147914][ T3626] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2186.155899][ T3626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2186.163886][ T3626] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2186.171883][ T3626] [ 2186.195039][ T28] audit: type=1804 audit(1707300992.334:1503): pid=3629 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir3596096293/syzkaller.vLqPfq/16/file0/bus" dev="loop3" ino=16 res=1 errno=0 10:16:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 7) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2186.378066][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.448855][ T3541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2186.469473][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.516729][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.580554][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.628532][ T3541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2186.652892][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.747614][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.803647][ T3633] FAULT_INJECTION: forcing a failure. [ 2186.803647][ T3633] name failslab, interval 1, probability 0, space 0, times 0 [ 2186.805053][ T3538] team0: Port device team_slave_0 added [ 2186.816657][ T1362] Bluetooth: hci0: command 0x0419 tx timeout [ 2186.836931][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.846105][ T3633] CPU: 0 PID: 3633 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2186.861313][ T3633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2186.871404][ T3633] Call Trace: [ 2186.874710][ T3633] [ 2186.877671][ T3633] dump_stack_lvl+0x1e7/0x2e0 [ 2186.882395][ T3633] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2186.887631][ T3633] ? __pfx__printk+0x10/0x10 [ 2186.892264][ T3633] ? __pfx___might_resched+0x10/0x10 [ 2186.897682][ T3633] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2186.903895][ T3633] should_fail_ex+0x3ae/0x4e0 [ 2186.908638][ T3633] ? tomoyo_encode+0x26f/0x540 [ 2186.913505][ T3633] should_failslab+0x9/0x20 [ 2186.918071][ T3633] __kmalloc+0xe6/0x490 [ 2186.922300][ T3633] tomoyo_encode+0x26f/0x540 [ 2186.923248][ T3538] team0: Port device team_slave_1 added [ 2186.926921][ T3633] tomoyo_mount_permission+0x356/0xb80 [ 2186.926955][ T3633] ? user_path_at_empty+0x4c/0x60 [ 2186.926983][ T3633] ? tomoyo_mount_permission+0x295/0xb80 [ 2186.927007][ T3633] ? user_path_at_empty+0x4c/0x60 [ 2186.927029][ T3633] ? __pfx_tomoyo_mount_permission+0x10/0x10 [ 2186.927052][ T3633] ? kasan_save_track+0x51/0x80 [ 2186.964840][ T3633] ? hook_sb_mount+0x128/0x3c0 [ 2186.969666][ T3633] security_sb_mount+0x8f/0xd0 [ 2186.974485][ T3633] path_mount+0xb9/0xfa0 [ 2186.978774][ T3633] ? kmem_cache_free+0x102/0x2a0 [ 2186.983785][ T3633] __se_sys_mount+0x2d9/0x3c0 [ 2186.986542][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2186.988490][ T3633] ? __pfx___se_sys_mount+0x10/0x10 [ 2187.007706][ T3633] ? do_syscall_64+0x108/0x240 [ 2187.012530][ T3633] ? __x64_sys_mount+0x20/0xc0 [ 2187.017349][ T3633] do_syscall_64+0xf9/0x240 [ 2187.021906][ T3633] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2187.027857][ T3633] RIP: 0033:0x7f681447dda9 [ 2187.036128][ T3633] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2187.038236][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2187.055744][ T3633] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2187.055775][ T3633] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2187.055792][ T3633] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2187.055807][ T3633] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 10:16:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x4, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2187.055823][ T3633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2187.055836][ T3633] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2187.055870][ T3633] [ 2187.160696][ T3541] team0: Port device team_slave_0 added [ 2187.296298][ T1362] Bluetooth: hci3: command 0x0419 tx timeout [ 2187.342643][ T3541] team0: Port device team_slave_1 added [ 2187.349188][ T3620] EXT4-fs error (device loop3): ext4_mb_mark_diskspace_used:4107: comm syz-executor.3: Allocating blocks 51-52 which overlap fs metadata [ 2187.405062][ T3538] batman_adv: batadv0: Adding interface: batadv_slave_0 10:16:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 8) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2187.436695][ T3538] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2187.438118][ T3621] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. [ 2187.508978][ T3538] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2187.660681][ T3538] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2187.699202][ T3620] EXT4-fs (loop3): pa ffff888036c482e8: logic 2, phys. 50, len 5 10:16:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x10, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2187.705957][ T3538] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2187.842768][ T3538] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2187.962146][ T3541] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2187.996825][ T3049] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2188.006011][ T3541] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2188.006047][ T3541] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2188.299426][ T3541] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2188.323173][ T3541] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2188.366140][ T3541] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2188.399154][ T3538] hsr_slave_0: entered promiscuous mode [ 2188.413067][ T3538] hsr_slave_1: entered promiscuous mode [ 2188.430159][ T3649] FAULT_INJECTION: forcing a failure. [ 2188.430159][ T3649] name failslab, interval 1, probability 0, space 0, times 0 [ 2188.444063][ T3649] CPU: 0 PID: 3649 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2188.454443][ T3649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2188.464545][ T3649] Call Trace: [ 2188.467864][ T3649] [ 2188.470827][ T3649] dump_stack_lvl+0x1e7/0x2e0 [ 2188.475560][ T3649] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2188.480822][ T3649] ? __pfx__printk+0x10/0x10 [ 2188.485458][ T3649] ? __pfx___might_resched+0x10/0x10 [ 2188.490794][ T3649] should_fail_ex+0x3ae/0x4e0 [ 2188.495518][ T3649] ? tomoyo_realpath_from_path+0xcf/0x5e0 [ 2188.501294][ T3649] should_failslab+0x9/0x20 [ 2188.505862][ T3649] __kmalloc+0xe6/0x490 [ 2188.510067][ T3649] ? tomoyo_realpath_from_path+0xc2/0x5e0 [ 2188.515825][ T3649] ? trace_kmalloc+0x1f/0xb0 [ 2188.520462][ T3649] tomoyo_realpath_from_path+0xcf/0x5e0 [ 2188.526060][ T3649] tomoyo_mount_permission+0x3bc/0xb80 [ 2188.531567][ T3649] ? user_path_at_empty+0x4c/0x60 [ 2188.536661][ T3649] ? tomoyo_mount_permission+0x295/0xb80 [ 2188.542369][ T3649] ? user_path_at_empty+0x4c/0x60 [ 2188.547463][ T3649] ? __pfx_tomoyo_mount_permission+0x10/0x10 [ 2188.553487][ T3649] ? kasan_save_track+0x51/0x80 [ 2188.558438][ T3649] ? hook_sb_mount+0x128/0x3c0 [ 2188.563265][ T3649] security_sb_mount+0x8f/0xd0 [ 2188.568355][ T3649] path_mount+0xb9/0xfa0 [ 2188.573956][ T3649] ? kmem_cache_free+0x102/0x2a0 [ 2188.578964][ T3649] __se_sys_mount+0x2d9/0x3c0 [ 2188.583694][ T3649] ? __pfx___se_sys_mount+0x10/0x10 [ 2188.589027][ T3649] ? do_syscall_64+0x108/0x240 [ 2188.593838][ T3649] ? __x64_sys_mount+0x20/0xc0 [ 2188.598650][ T3649] do_syscall_64+0xf9/0x240 [ 2188.603210][ T3649] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2188.609154][ T3649] RIP: 0033:0x7f681447dda9 [ 2188.613614][ T3649] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2188.633271][ T3649] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2188.641742][ T3649] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2188.649767][ T3649] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2188.658574][ T3649] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2188.666587][ T3649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2188.674611][ T3649] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2188.682654][ T3649] [ 2188.731963][ T3649] ERROR: Out of memory at tomoyo_realpath_from_path. 10:16:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 9) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x5, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2189.038071][ T3541] hsr_slave_0: entered promiscuous mode [ 2189.061076][ T3541] hsr_slave_1: entered promiscuous mode [ 2189.077473][ T3541] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2189.090780][ T3541] Cannot create hsr debugfs directory [ 2189.314920][ T3661] FAULT_INJECTION: forcing a failure. [ 2189.314920][ T3661] name failslab, interval 1, probability 0, space 0, times 0 [ 2189.353616][ T3661] CPU: 1 PID: 3661 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2189.364023][ T3661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2189.374131][ T3661] Call Trace: [ 2189.377449][ T3661] [ 2189.380419][ T3661] dump_stack_lvl+0x1e7/0x2e0 [ 2189.385156][ T3661] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2189.390410][ T3661] ? __pfx__printk+0x10/0x10 [ 2189.395059][ T3661] ? __pfx___might_resched+0x10/0x10 [ 2189.400477][ T3661] should_fail_ex+0x3ae/0x4e0 [ 2189.405196][ T3661] ? tomoyo_encode+0x26f/0x540 [ 2189.410016][ T3661] should_failslab+0x9/0x20 [ 2189.414574][ T3661] __kmalloc+0xe6/0x490 [ 2189.418776][ T3661] ? __pfx_d_absolute_path+0x10/0x10 [ 2189.424109][ T3661] ? tomoyo_realpath_from_path+0xcf/0x5e0 [ 2189.429873][ T3661] ? rcu_is_watching+0x15/0xb0 [ 2189.434719][ T3661] tomoyo_encode+0x26f/0x540 [ 2189.439365][ T3661] tomoyo_realpath_from_path+0x59e/0x5e0 [ 2189.445059][ T3661] tomoyo_mount_permission+0x3bc/0xb80 [ 2189.450564][ T3661] ? user_path_at_empty+0x4c/0x60 [ 2189.455632][ T3661] ? tomoyo_mount_permission+0x295/0xb80 [ 2189.461311][ T3661] ? user_path_at_empty+0x4c/0x60 [ 2189.466385][ T3661] ? __pfx_tomoyo_mount_permission+0x10/0x10 [ 2189.472408][ T3661] ? kasan_save_track+0x51/0x80 [ 2189.477359][ T3661] ? hook_sb_mount+0x128/0x3c0 [ 2189.482173][ T3661] security_sb_mount+0x8f/0xd0 [ 2189.486994][ T3661] path_mount+0xb9/0xfa0 [ 2189.491283][ T3661] ? kmem_cache_free+0x102/0x2a0 [ 2189.496291][ T3661] __se_sys_mount+0x2d9/0x3c0 [ 2189.501024][ T3661] ? __pfx___se_sys_mount+0x10/0x10 [ 2189.506264][ T3661] ? do_syscall_64+0x108/0x240 [ 2189.511079][ T3661] ? __x64_sys_mount+0x20/0xc0 [ 2189.515880][ T3661] do_syscall_64+0xf9/0x240 [ 2189.520432][ T3661] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2189.526371][ T3661] RIP: 0033:0x7f681447dda9 [ 2189.530820][ T3661] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2189.550467][ T3661] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2189.558933][ T3661] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2189.566952][ T3661] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2189.574967][ T3661] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2189.582981][ T3661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2189.591017][ T3661] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2189.599054][ T3661] [ 2189.643976][ T3661] ERROR: Out of memory at tomoyo_realpath_from_path. 10:16:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x10, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 10) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2189.830849][T27368] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2190.165045][T27368] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2190.353009][ T3668] FAULT_INJECTION: forcing a failure. [ 2190.353009][ T3668] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.431973][ T3668] CPU: 0 PID: 3668 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2190.442387][ T3668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2190.452494][ T3668] Call Trace: [ 2190.455822][ T3668] [ 2190.458794][ T3668] dump_stack_lvl+0x1e7/0x2e0 [ 2190.463631][ T3668] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2190.468898][ T3668] ? __pfx__printk+0x10/0x10 [ 2190.473640][ T3668] ? __pfx___might_resched+0x10/0x10 [ 2190.478987][ T3668] should_fail_ex+0x3ae/0x4e0 [ 2190.483740][ T3668] ? tomoyo_encode+0x26f/0x540 [ 2190.488568][ T3668] should_failslab+0x9/0x20 [ 2190.493135][ T3668] __kmalloc+0xe6/0x490 [ 2190.497366][ T3668] tomoyo_encode+0x26f/0x540 [ 2190.502028][ T3668] tomoyo_mount_permission+0x53a/0xb80 [ 2190.507553][ T3668] ? tomoyo_mount_permission+0x295/0xb80 [ 2190.513242][ T3668] ? user_path_at_empty+0x4c/0x60 [ 2190.518323][ T3668] ? __pfx_tomoyo_mount_permission+0x10/0x10 [ 2190.524358][ T3668] ? kasan_save_track+0x51/0x80 [ 2190.529320][ T3668] ? hook_sb_mount+0x128/0x3c0 [ 2190.534149][ T3668] security_sb_mount+0x8f/0xd0 [ 2190.538981][ T3668] path_mount+0xb9/0xfa0 [ 2190.543291][ T3668] ? kmem_cache_free+0x102/0x2a0 [ 2190.548310][ T3668] __se_sys_mount+0x2d9/0x3c0 [ 2190.553058][ T3668] ? __pfx___se_sys_mount+0x10/0x10 [ 2190.558320][ T3668] ? do_syscall_64+0x108/0x240 [ 2190.563150][ T3668] ? __x64_sys_mount+0x20/0xc0 [ 2190.567988][ T3668] do_syscall_64+0xf9/0x240 [ 2190.572567][ T3668] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2190.578517][ T3668] RIP: 0033:0x7f681447dda9 [ 2190.582978][ T3668] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2190.602725][ T3668] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2190.611282][ T3668] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2190.619303][ T3668] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2190.627328][ T3668] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2190.635350][ T3668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2190.643375][ T3668] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2190.651416][ T3668] 10:16:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x6, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 11) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2190.859025][T27368] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2191.153208][T27368] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:16:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x10, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2191.414812][ T3689] FAULT_INJECTION: forcing a failure. [ 2191.414812][ T3689] name failslab, interval 1, probability 0, space 0, times 0 [ 2191.464817][ T3689] CPU: 1 PID: 3689 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2191.475228][ T3689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2191.485384][ T3689] Call Trace: [ 2191.488709][ T3689] [ 2191.491683][ T3689] dump_stack_lvl+0x1e7/0x2e0 [ 2191.496427][ T3689] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2191.501683][ T3689] ? __pfx__printk+0x10/0x10 [ 2191.506351][ T3689] should_fail_ex+0x3ae/0x4e0 [ 2191.511086][ T3689] ? alloc_fs_context+0x63/0x800 [ 2191.516068][ T3689] should_failslab+0x9/0x20 [ 2191.520620][ T3689] kmalloc_trace+0x76/0x360 [ 2191.525191][ T3689] alloc_fs_context+0x63/0x800 [ 2191.529994][ T3689] ? do_raw_read_unlock+0x3c/0x80 [ 2191.535060][ T3689] ? _raw_read_unlock+0x28/0x50 [ 2191.540050][ T3689] ? get_fs_type+0x3fd/0x480 [ 2191.544683][ T3689] do_new_mount+0x160/0xb40 [ 2191.549226][ T3689] ? ns_capable+0x89/0xf0 [ 2191.553604][ T3689] ? __pfx_do_new_mount+0x10/0x10 [ 2191.558778][ T3689] __se_sys_mount+0x2d9/0x3c0 [ 2191.563503][ T3689] ? __pfx___se_sys_mount+0x10/0x10 [ 2191.568750][ T3689] ? do_syscall_64+0x108/0x240 [ 2191.573565][ T3689] ? __x64_sys_mount+0x20/0xc0 [ 2191.578378][ T3689] do_syscall_64+0xf9/0x240 [ 2191.582931][ T3689] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2191.588870][ T3689] RIP: 0033:0x7f681447dda9 [ 2191.593319][ T3689] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2191.612968][ T3689] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2191.621431][ T3689] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2191.629448][ T3689] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2191.637458][ T3689] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2191.645469][ T3689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2191.653483][ T3689] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2191.661525][ T3689] 10:16:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 12) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2192.109708][ T3696] FAULT_INJECTION: forcing a failure. [ 2192.109708][ T3696] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.142702][ T3696] CPU: 1 PID: 3696 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2192.153112][ T3696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2192.163222][ T3696] Call Trace: [ 2192.166539][ T3696] [ 2192.169513][ T3696] dump_stack_lvl+0x1e7/0x2e0 [ 2192.174254][ T3696] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2192.179512][ T3696] ? __pfx__printk+0x10/0x10 [ 2192.184163][ T3696] ? __asan_memset+0x23/0x50 [ 2192.188814][ T3696] ? __asan_memset+0x23/0x50 [ 2192.193445][ T3696] should_fail_ex+0x3ae/0x4e0 [ 2192.198191][ T3696] ? fuse_init_fs_context+0x55/0x200 [ 2192.203521][ T3696] should_failslab+0x9/0x20 [ 2192.208083][ T3696] kmalloc_trace+0x76/0x360 [ 2192.212645][ T3696] fuse_init_fs_context+0x55/0x200 [ 2192.217794][ T3696] ? __pfx_fuse_init_fs_context+0x10/0x10 [ 2192.223561][ T3696] alloc_fs_context+0x689/0x800 [ 2192.228467][ T3696] do_new_mount+0x160/0xb40 [ 2192.233025][ T3696] ? ns_capable+0x89/0xf0 [ 2192.237419][ T3696] ? __pfx_do_new_mount+0x10/0x10 [ 2192.242502][ T3696] __se_sys_mount+0x2d9/0x3c0 [ 2192.247241][ T3696] ? __pfx___se_sys_mount+0x10/0x10 [ 2192.252486][ T3696] ? do_syscall_64+0x108/0x240 10:16:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x10) [ 2192.257306][ T3696] ? __x64_sys_mount+0x20/0xc0 [ 2192.262116][ T3696] do_syscall_64+0xf9/0x240 [ 2192.266669][ T3696] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2192.272609][ T3696] RIP: 0033:0x7f681447dda9 [ 2192.277056][ T3696] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2192.296700][ T3696] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2192.305154][ T3696] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2192.313177][ T3696] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2192.321192][ T3696] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2192.329219][ T3696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2192.337229][ T3696] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2192.345253][ T3696] 10:16:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 13) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2192.907151][ T3702] FAULT_INJECTION: forcing a failure. [ 2192.907151][ T3702] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.991571][ T3702] CPU: 0 PID: 3702 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2193.001993][ T3702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2193.012110][ T3702] Call Trace: [ 2193.015437][ T3702] [ 2193.018407][ T3702] dump_stack_lvl+0x1e7/0x2e0 [ 2193.023146][ T3702] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2193.028487][ T3702] ? __pfx__printk+0x10/0x10 [ 2193.033117][ T3702] ? __pfx___might_resched+0x10/0x10 [ 2193.038447][ T3702] should_fail_ex+0x3ae/0x4e0 [ 2193.043157][ T3702] should_failslab+0x9/0x20 [ 2193.047693][ T3702] __kmalloc_node_track_caller+0xe9/0x4e0 [ 2193.053445][ T3702] ? generic_parse_monolithic+0x26c/0x400 [ 2193.059187][ T3702] ? smack_sb_eat_lsm_opts+0x5ee/0x6a0 [ 2193.064672][ T3702] kmemdup_nul+0x30/0xa0 [ 2193.068930][ T3702] generic_parse_monolithic+0x26c/0x400 [ 2193.074496][ T3702] ? kmalloc_trace+0x1d6/0x360 [ 2193.079291][ T3702] ? __pfx_generic_parse_monolithic+0x10/0x10 [ 2193.085383][ T3702] ? module_put+0x13a/0x2b0 [ 2193.089906][ T3702] do_new_mount+0x28f/0xb40 [ 2193.094424][ T3702] ? ns_capable+0x89/0xf0 [ 2193.098781][ T3702] ? __pfx_do_new_mount+0x10/0x10 [ 2193.103832][ T3702] __se_sys_mount+0x2d9/0x3c0 [ 2193.108531][ T3702] ? __pfx___se_sys_mount+0x10/0x10 [ 2193.113748][ T3702] ? do_syscall_64+0x108/0x240 [ 2193.118535][ T3702] ? __x64_sys_mount+0x20/0xc0 [ 2193.123320][ T3702] do_syscall_64+0xf9/0x240 [ 2193.127850][ T3702] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2193.133764][ T3702] RIP: 0033:0x7f681447dda9 [ 2193.138213][ T3702] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2193.157840][ T3702] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2193.166284][ T3702] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2193.174273][ T3702] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2193.182255][ T3702] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2193.190239][ T3702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2193.198222][ T3702] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2193.206223][ T3702] 10:16:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 14) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2193.778238][ T3709] FAULT_INJECTION: forcing a failure. [ 2193.778238][ T3709] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.806010][ T3709] CPU: 1 PID: 3709 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2193.816417][ T3709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2193.826524][ T3709] Call Trace: [ 2193.829857][ T3709] [ 2193.832827][ T3709] dump_stack_lvl+0x1e7/0x2e0 [ 2193.837574][ T3709] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2193.842827][ T3709] ? __pfx__printk+0x10/0x10 [ 2193.847470][ T3709] ? __pfx___might_resched+0x10/0x10 [ 2193.852801][ T3709] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2193.858869][ T3709] should_fail_ex+0x3ae/0x4e0 [ 2193.863624][ T3709] should_failslab+0x9/0x20 [ 2193.868193][ T3709] __kmalloc_node_track_caller+0xe9/0x4e0 [ 2193.873986][ T3709] ? generic_parse_monolithic+0x26c/0x400 [ 2193.879762][ T3709] kmemdup_nul+0x30/0xa0 [ 2193.884057][ T3709] generic_parse_monolithic+0x26c/0x400 [ 2193.889654][ T3709] ? kmalloc_trace+0x1d6/0x360 [ 2193.894483][ T3709] ? __pfx_generic_parse_monolithic+0x10/0x10 [ 2193.900624][ T3709] ? module_put+0x13a/0x2b0 [ 2193.905177][ T3709] do_new_mount+0x28f/0xb40 [ 2193.909734][ T3709] ? ns_capable+0x89/0xf0 [ 2193.914126][ T3709] ? __pfx_do_new_mount+0x10/0x10 [ 2193.919218][ T3709] __se_sys_mount+0x2d9/0x3c0 [ 2193.923952][ T3709] ? __pfx___se_sys_mount+0x10/0x10 [ 2193.929207][ T3709] ? do_syscall_64+0x108/0x240 [ 2193.934115][ T3709] ? __x64_sys_mount+0x20/0xc0 [ 2193.938947][ T3709] do_syscall_64+0xf9/0x240 [ 2193.943506][ T3709] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2193.949456][ T3709] RIP: 0033:0x7f681447dda9 [ 2193.953933][ T3709] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2193.973595][ T3709] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2193.982086][ T3709] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2193.990111][ T3709] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2193.998131][ T3709] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2194.006147][ T3709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2194.014163][ T3709] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2194.022196][ T3709] 10:16:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:16:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 15) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2194.998320][ T3724] FAULT_INJECTION: forcing a failure. [ 2194.998320][ T3724] name failslab, interval 1, probability 0, space 0, times 0 [ 2195.051184][ T3724] CPU: 0 PID: 3724 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2195.061598][ T3724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2195.071732][ T3724] Call Trace: [ 2195.075033][ T3724] [ 2195.077980][ T3724] dump_stack_lvl+0x1e7/0x2e0 [ 2195.082690][ T3724] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2195.087912][ T3724] ? __pfx__printk+0x10/0x10 [ 2195.092537][ T3724] ? __pfx___might_resched+0x10/0x10 [ 2195.097843][ T3724] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2195.103856][ T3724] should_fail_ex+0x3ae/0x4e0 [ 2195.108561][ T3724] should_failslab+0x9/0x20 [ 2195.113097][ T3724] __kmalloc_node_track_caller+0xe9/0x4e0 [ 2195.118844][ T3724] ? generic_parse_monolithic+0x26c/0x400 [ 2195.124586][ T3724] kmemdup_nul+0x30/0xa0 [ 2195.128851][ T3724] generic_parse_monolithic+0x26c/0x400 [ 2195.134421][ T3724] ? kmalloc_trace+0x1d6/0x360 [ 2195.139218][ T3724] ? __pfx_generic_parse_monolithic+0x10/0x10 [ 2195.145316][ T3724] ? module_put+0x13a/0x2b0 [ 2195.149842][ T3724] do_new_mount+0x28f/0xb40 [ 2195.154361][ T3724] ? ns_capable+0x89/0xf0 [ 2195.158718][ T3724] ? __pfx_do_new_mount+0x10/0x10 [ 2195.163771][ T3724] __se_sys_mount+0x2d9/0x3c0 [ 2195.168471][ T3724] ? __pfx___se_sys_mount+0x10/0x10 [ 2195.173694][ T3724] ? do_syscall_64+0x108/0x240 [ 2195.178484][ T3724] ? __x64_sys_mount+0x20/0xc0 [ 2195.183288][ T3724] do_syscall_64+0xf9/0x240 [ 2195.187820][ T3724] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2195.193742][ T3724] RIP: 0033:0x7f681447dda9 [ 2195.198172][ T3724] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2195.217803][ T3724] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2195.226238][ T3724] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2195.234229][ T3724] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2195.242217][ T3724] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2195.250207][ T3724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2195.258192][ T3724] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2195.266195][ T3724] 10:16:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 16) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) (async) read$FUSE(r2, &(0x7f0000001c80)={0x2020}, 0x2020) (async) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0/file0\x00'}) (async) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) (async) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) (async) [ 2195.480904][ T3538] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2195.509338][ T3538] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2195.603103][ T3538] netdevsim netdevsim0 netdevsim2: renamed from eth2 10:16:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2195.781630][ T3538] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2196.012136][ T3732] FAULT_INJECTION: forcing a failure. [ 2196.012136][ T3732] name failslab, interval 1, probability 0, space 0, times 0 [ 2196.080462][ T3732] CPU: 0 PID: 3732 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2196.090877][ T3732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2196.100982][ T3732] Call Trace: [ 2196.104295][ T3732] [ 2196.107261][ T3732] dump_stack_lvl+0x1e7/0x2e0 [ 2196.111995][ T3732] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2196.117250][ T3732] ? __pfx__printk+0x10/0x10 [ 2196.121901][ T3732] ? __pfx___might_resched+0x10/0x10 [ 2196.127230][ T3732] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2196.133273][ T3732] should_fail_ex+0x3ae/0x4e0 [ 2196.138010][ T3732] should_failslab+0x9/0x20 [ 2196.142567][ T3732] __kmalloc_node_track_caller+0xe9/0x4e0 [ 2196.148351][ T3732] ? generic_parse_monolithic+0x26c/0x400 [ 2196.154145][ T3732] kmemdup_nul+0x30/0xa0 [ 2196.158442][ T3732] generic_parse_monolithic+0x26c/0x400 [ 2196.164043][ T3732] ? kmalloc_trace+0x1d6/0x360 [ 2196.168877][ T3732] ? __pfx_generic_parse_monolithic+0x10/0x10 [ 2196.175013][ T3732] ? module_put+0x13a/0x2b0 [ 2196.179571][ T3732] do_new_mount+0x28f/0xb40 [ 2196.184104][ T3732] ? ns_capable+0x89/0xf0 [ 2196.188469][ T3732] ? __pfx_do_new_mount+0x10/0x10 [ 2196.193523][ T3732] __se_sys_mount+0x2d9/0x3c0 [ 2196.198233][ T3732] ? __pfx___se_sys_mount+0x10/0x10 [ 2196.203451][ T3732] ? do_syscall_64+0x108/0x240 [ 2196.208243][ T3732] ? __x64_sys_mount+0x20/0xc0 [ 2196.213033][ T3732] do_syscall_64+0xf9/0x240 [ 2196.217569][ T3732] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2196.223499][ T3732] RIP: 0033:0x7f681447dda9 [ 2196.227936][ T3732] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2196.247561][ T3732] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2196.255999][ T3732] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2196.263990][ T3732] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2196.271979][ T3732] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2196.279966][ T3732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2196.287952][ T3732] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2196.295962][ T3732] 10:16:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 17) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) (rerun: 32) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2196.877035][ T3538] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2197.093082][T27368] hsr_slave_0: left promiscuous mode [ 2197.123901][T27368] hsr_slave_1: left promiscuous mode [ 2197.160835][T27368] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2197.175482][ T3747] FAULT_INJECTION: forcing a failure. [ 2197.175482][ T3747] name failslab, interval 1, probability 0, space 0, times 0 [ 2197.179633][T27368] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2197.229269][T27368] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2197.233927][ T3747] CPU: 0 PID: 3747 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2197.247056][ T3747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2197.257157][ T3747] Call Trace: [ 2197.257839][T27368] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2197.260465][ T3747] [ 2197.260479][ T3747] dump_stack_lvl+0x1e7/0x2e0 [ 2197.260522][ T3747] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2197.280448][ T3747] ? __pfx__printk+0x10/0x10 [ 2197.285077][ T3747] should_fail_ex+0x3ae/0x4e0 [ 2197.289782][ T3747] ? fuse_get_tree+0x78/0x4b0 [ 2197.294475][ T3747] should_failslab+0x9/0x20 [ 2197.298999][ T3747] kmalloc_trace+0x76/0x360 [ 2197.303530][ T3747] fuse_get_tree+0x78/0x4b0 [ 2197.308043][ T3747] ? bpf_lsm_capable+0x9/0x10 [ 2197.312738][ T3747] ? security_capable+0x90/0xb0 [ 2197.317623][ T3747] vfs_get_tree+0x90/0x2a0 [ 2197.322060][ T3747] do_new_mount+0x2be/0xb40 [ 2197.326581][ T3747] ? ns_capable+0x89/0xf0 [ 2197.330940][ T3747] ? __pfx_do_new_mount+0x10/0x10 [ 2197.335991][ T3747] __se_sys_mount+0x2d9/0x3c0 [ 2197.340691][ T3747] ? __pfx___se_sys_mount+0x10/0x10 [ 2197.345913][ T3747] ? do_syscall_64+0x108/0x240 [ 2197.350712][ T3747] ? __x64_sys_mount+0x20/0xc0 [ 2197.355501][ T3747] do_syscall_64+0xf9/0x240 [ 2197.360045][ T3747] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2197.365965][ T3747] RIP: 0033:0x7f681447dda9 [ 2197.370396][ T3747] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2197.390027][ T3747] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2197.398476][ T3747] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2197.406468][ T3747] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2197.414455][ T3747] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2197.422441][ T3747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2197.430425][ T3747] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2197.438426][ T3747] 10:16:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:16:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 18) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2197.569377][T27368] bridge_slave_1: left allmulticast mode [ 2197.611681][T27368] bridge_slave_1: left promiscuous mode [ 2197.629927][T27368] bridge0: port 2(bridge_slave_1) entered disabled state [ 2197.671360][T27368] bridge_slave_0: left allmulticast mode [ 2197.706434][T27368] bridge_slave_0: left promiscuous mode [ 2197.717988][T27368] bridge0: port 1(bridge_slave_0) entered disabled state [ 2197.773406][T27368] veth1_macvtap: left promiscuous mode [ 2197.786540][T27368] veth0_macvtap: left promiscuous mode [ 2197.792291][T27368] veth1_vlan: left promiscuous mode [ 2197.816526][T27368] veth0_vlan: left promiscuous mode [ 2198.224486][ T3765] FAULT_INJECTION: forcing a failure. [ 2198.224486][ T3765] name failslab, interval 1, probability 0, space 0, times 0 [ 2198.298010][ T3765] CPU: 1 PID: 3765 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2198.308422][ T3765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2198.318528][ T3765] Call Trace: [ 2198.321846][ T3765] [ 2198.324816][ T3765] dump_stack_lvl+0x1e7/0x2e0 [ 2198.329566][ T3765] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2198.334830][ T3765] ? __pfx__printk+0x10/0x10 [ 2198.339495][ T3765] should_fail_ex+0x3ae/0x4e0 [ 2198.344238][ T3765] ? fuse_get_tree+0xb8/0x4b0 [ 2198.348976][ T3765] should_failslab+0x9/0x20 [ 2198.353541][ T3765] kmalloc_trace+0x76/0x360 [ 2198.358113][ T3765] ? fuse_get_tree+0x78/0x4b0 [ 2198.362849][ T3765] fuse_get_tree+0xb8/0x4b0 [ 2198.367404][ T3765] ? bpf_lsm_capable+0x9/0x10 [ 2198.372135][ T3765] ? security_capable+0x90/0xb0 [ 2198.377050][ T3765] vfs_get_tree+0x90/0x2a0 [ 2198.381522][ T3765] do_new_mount+0x2be/0xb40 [ 2198.386072][ T3765] ? ns_capable+0x89/0xf0 [ 2198.390462][ T3765] ? __pfx_do_new_mount+0x10/0x10 [ 2198.395551][ T3765] __se_sys_mount+0x2d9/0x3c0 [ 2198.400288][ T3765] ? __pfx___se_sys_mount+0x10/0x10 [ 2198.405543][ T3765] ? do_syscall_64+0x108/0x240 [ 2198.410370][ T3765] ? __x64_sys_mount+0x20/0xc0 [ 2198.415207][ T3765] do_syscall_64+0xf9/0x240 [ 2198.419773][ T3765] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2198.425721][ T3765] RIP: 0033:0x7f681447dda9 [ 2198.430177][ T3765] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2198.449828][ T3765] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2198.458340][ T3765] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2198.466367][ T3765] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2198.474383][ T3765] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2198.482393][ T3765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2198.490428][ T3765] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2198.498474][ T3765] 10:16:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = open(&(0x7f0000000480)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000002c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0/file0\x00'}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r2}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 19) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2199.158136][ T3775] FAULT_INJECTION: forcing a failure. [ 2199.158136][ T3775] name failslab, interval 1, probability 0, space 0, times 0 [ 2199.215720][ T3775] CPU: 1 PID: 3775 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2199.226129][ T3775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2199.236234][ T3775] Call Trace: [ 2199.239553][ T3775] [ 2199.242527][ T3775] dump_stack_lvl+0x1e7/0x2e0 [ 2199.247269][ T3775] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2199.252523][ T3775] ? __pfx__printk+0x10/0x10 [ 2199.257177][ T3775] ? __pfx___might_resched+0x10/0x10 [ 2199.262515][ T3775] should_fail_ex+0x3ae/0x4e0 [ 2199.267250][ T3775] ? alloc_super+0x5a/0x8f0 [ 2199.271801][ T3775] should_failslab+0x9/0x20 [ 2199.276361][ T3775] kmalloc_trace+0x76/0x360 [ 2199.280938][ T3775] alloc_super+0x5a/0x8f0 [ 2199.285322][ T3775] sget_fc+0x269/0x780 [ 2199.289447][ T3775] ? __pfx_set_anon_super_fc+0x10/0x10 [ 2199.294967][ T3775] ? __pfx_fuse_fill_super+0x10/0x10 [ 2199.300302][ T3775] get_tree_nodev+0x2a/0x140 [ 2199.304950][ T3775] fuse_get_tree+0x350/0x4b0 [ 2199.309597][ T3775] vfs_get_tree+0x90/0x2a0 [ 2199.314159][ T3775] do_new_mount+0x2be/0xb40 [ 2199.318708][ T3775] ? ns_capable+0x89/0xf0 [ 2199.323073][ T3775] ? __pfx_do_new_mount+0x10/0x10 [ 2199.328122][ T3775] __se_sys_mount+0x2d9/0x3c0 [ 2199.332822][ T3775] ? __pfx___se_sys_mount+0x10/0x10 [ 2199.338039][ T3775] ? do_syscall_64+0x108/0x240 [ 2199.342828][ T3775] ? __x64_sys_mount+0x20/0xc0 [ 2199.347614][ T3775] do_syscall_64+0xf9/0x240 [ 2199.352141][ T3775] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2199.358055][ T3775] RIP: 0033:0x7f681447dda9 [ 2199.362504][ T3775] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2199.382143][ T3775] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2199.390582][ T3775] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2199.398575][ T3775] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2199.406560][ T3775] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2199.414555][ T3775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2199.422545][ T3775] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2199.430549][ T3775] 10:16:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 20) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2199.793317][T27368] team0 (unregistering): Port device team_slave_1 removed [ 2199.844701][T27368] team0 (unregistering): Port device team_slave_0 removed [ 2199.864389][T27368] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 10:16:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2199.908434][T27368] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 10:16:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = open(&(0x7f0000000480)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000002c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0/file0\x00'}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r2}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2200.207174][ T3782] FAULT_INJECTION: forcing a failure. [ 2200.207174][ T3782] name failslab, interval 1, probability 0, space 0, times 0 [ 2200.237381][ T3782] CPU: 1 PID: 3782 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2200.247812][ T3782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2200.257907][ T3782] Call Trace: [ 2200.261218][ T3782] [ 2200.264178][ T3782] dump_stack_lvl+0x1e7/0x2e0 [ 2200.268933][ T3782] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2200.274176][ T3782] ? __pfx__printk+0x10/0x10 [ 2200.278912][ T3782] should_fail_ex+0x3ae/0x4e0 [ 2200.283634][ T3782] ? security_sb_alloc+0x3e/0x130 [ 2200.288710][ T3782] should_failslab+0x9/0x20 [ 2200.293258][ T3782] __kmalloc+0xe6/0x490 [ 2200.297455][ T3782] ? __pfx___down_write_common+0x10/0x10 [ 2200.303138][ T3782] security_sb_alloc+0x3e/0x130 [ 2200.308038][ T3782] alloc_super+0x216/0x8f0 [ 2200.312507][ T3782] sget_fc+0x269/0x780 [ 2200.316626][ T3782] ? __pfx_set_anon_super_fc+0x10/0x10 [ 2200.322128][ T3782] ? __pfx_fuse_fill_super+0x10/0x10 [ 2200.327452][ T3782] get_tree_nodev+0x2a/0x140 [ 2200.332081][ T3782] fuse_get_tree+0x350/0x4b0 [ 2200.336713][ T3782] vfs_get_tree+0x90/0x2a0 [ 2200.341173][ T3782] do_new_mount+0x2be/0xb40 [ 2200.345711][ T3782] ? ns_capable+0x89/0xf0 [ 2200.350089][ T3782] ? __pfx_do_new_mount+0x10/0x10 [ 2200.355163][ T3782] __se_sys_mount+0x2d9/0x3c0 [ 2200.359884][ T3782] ? __pfx___se_sys_mount+0x10/0x10 [ 2200.365124][ T3782] ? do_syscall_64+0x108/0x240 [ 2200.369939][ T3782] ? __x64_sys_mount+0x20/0xc0 [ 2200.374741][ T3782] do_syscall_64+0xf9/0x240 [ 2200.379293][ T3782] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2200.385231][ T3782] RIP: 0033:0x7f681447dda9 [ 2200.389679][ T3782] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2200.409346][ T3782] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2200.417804][ T3782] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2200.425811][ T3782] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2200.433821][ T3782] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2200.441832][ T3782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2200.449841][ T3782] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2200.457872][ T3782] 10:16:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 21) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2200.619213][T27368] bond0 (unregistering): Released all slaves 10:16:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2200.880060][ T3541] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 2200.908900][ T3541] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 2200.925809][ T3541] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 2200.943015][ T3541] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 2201.041924][ T3538] 8021q: adding VLAN 0 to HW filter on device team0 [ 2201.220751][T28473] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.228030][T28473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2201.243955][T28473] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.251220][T28473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2201.261096][ T3794] FAULT_INJECTION: forcing a failure. [ 2201.261096][ T3794] name failslab, interval 1, probability 0, space 0, times 0 [ 2201.276187][ T3794] CPU: 1 PID: 3794 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2201.286582][ T3794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2201.296685][ T3794] Call Trace: [ 2201.300009][ T3794] [ 2201.302972][ T3794] dump_stack_lvl+0x1e7/0x2e0 [ 2201.307719][ T3794] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2201.312988][ T3794] ? __pfx__printk+0x10/0x10 [ 2201.317647][ T3794] ? pcpu_memcg_post_alloc_hook+0x127/0x630 [ 2201.323596][ T3794] should_fail_ex+0x3ae/0x4e0 [ 2201.328324][ T3794] ? shrinker_alloc+0x5a/0x9f0 [ 2201.333134][ T3794] should_failslab+0x9/0x20 [ 2201.337682][ T3794] kmalloc_trace+0x76/0x360 [ 2201.342221][ T3794] ? __pfx_lockdep_init_map_type+0x10/0x10 [ 2201.348060][ T3794] shrinker_alloc+0x5a/0x9f0 [ 2201.352671][ T3794] ? __pfx_lockdep_init_map_type+0x10/0x10 [ 2201.358500][ T3794] ? __raw_spin_lock_init+0x45/0x100 [ 2201.363802][ T3794] alloc_super+0x69f/0x8f0 [ 2201.368236][ T3794] sget_fc+0x269/0x780 [ 2201.372327][ T3794] ? __pfx_set_anon_super_fc+0x10/0x10 [ 2201.377879][ T3794] ? __pfx_fuse_fill_super+0x10/0x10 [ 2201.383183][ T3794] get_tree_nodev+0x2a/0x140 [ 2201.387799][ T3794] fuse_get_tree+0x350/0x4b0 [ 2201.392410][ T3794] vfs_get_tree+0x90/0x2a0 [ 2201.396849][ T3794] do_new_mount+0x2be/0xb40 [ 2201.401367][ T3794] ? ns_capable+0x89/0xf0 [ 2201.405722][ T3794] ? __pfx_do_new_mount+0x10/0x10 [ 2201.410770][ T3794] __se_sys_mount+0x2d9/0x3c0 [ 2201.415472][ T3794] ? __pfx___se_sys_mount+0x10/0x10 [ 2201.420694][ T3794] ? do_syscall_64+0x108/0x240 [ 2201.425482][ T3794] ? __x64_sys_mount+0x20/0xc0 [ 2201.430264][ T3794] do_syscall_64+0xf9/0x240 [ 2201.434794][ T3794] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2201.440799][ T3794] RIP: 0033:0x7f681447dda9 [ 2201.445234][ T3794] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2201.464862][ T3794] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2201.473303][ T3794] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2201.481289][ T3794] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2201.489281][ T3794] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2201.497275][ T3794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2201.505257][ T3794] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2201.513254][ T3794] 10:16:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) open(&(0x7f0000000480)='.\x00', 0x0, 0x0) (async) r1 = open(&(0x7f0000000480)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000002c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0/file0\x00'}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r2}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2201.624195][ T3541] 8021q: adding VLAN 0 to HW filter on device bond0 10:16:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2201.671632][ T3541] 8021q: adding VLAN 0 to HW filter on device team0 [ 2201.722127][ T943] bridge0: port 1(bridge_slave_0) entered blocking state [ 2201.729483][ T943] bridge0: port 1(bridge_slave_0) entered forwarding state 10:16:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 22) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2201.783210][ T943] bridge0: port 2(bridge_slave_1) entered blocking state [ 2201.790488][ T943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2202.514416][ T3819] fuse: Bad value for 'fd' 10:16:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000ac051e599c"]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) read$FUSE(r0, &(0x7f0000004400)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000006440)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, r3}, 0x10) fcntl$addseals(r0, 0x409, 0x8) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) r4 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$6lowpan_enable(r4, &(0x7f0000000080)='0', 0x1) 10:16:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2202.662294][ T3822] FAULT_INJECTION: forcing a failure. [ 2202.662294][ T3822] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.706332][ T3822] CPU: 1 PID: 3822 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2202.716828][ T3822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2202.718722][ T3538] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2202.726901][ T3822] Call Trace: [ 2202.726958][ T3822] [ 2202.740073][ T3822] dump_stack_lvl+0x1e7/0x2e0 [ 2202.744807][ T3822] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2202.750062][ T3822] ? __pfx__printk+0x10/0x10 [ 2202.754719][ T3822] ? __pfx___might_resched+0x10/0x10 [ 2202.760060][ T3822] ? idr_alloc+0x104/0x1b0 [ 2202.764538][ T3822] should_fail_ex+0x3ae/0x4e0 [ 2202.769270][ T3822] ? __list_lru_init+0xad/0x5e0 [ 2202.774161][ T3822] should_failslab+0x9/0x20 [ 2202.778692][ T3822] __kmalloc+0xe6/0x490 [ 2202.782873][ T3822] ? shrinker_alloc+0x29a/0x9f0 [ 2202.787740][ T3822] ? __pfx_lockdep_init_map_type+0x10/0x10 [ 2202.793570][ T3822] __list_lru_init+0xad/0x5e0 [ 2202.798270][ T3822] ? __raw_spin_lock_init+0x45/0x100 [ 2202.803581][ T3822] alloc_super+0x77a/0x8f0 [ 2202.808014][ T3822] sget_fc+0x269/0x780 [ 2202.812099][ T3822] ? __pfx_set_anon_super_fc+0x10/0x10 [ 2202.817606][ T3822] ? __pfx_fuse_fill_super+0x10/0x10 [ 2202.822922][ T3822] get_tree_nodev+0x2a/0x140 [ 2202.827540][ T3822] fuse_get_tree+0x350/0x4b0 [ 2202.832158][ T3822] vfs_get_tree+0x90/0x2a0 [ 2202.836600][ T3822] do_new_mount+0x2be/0xb40 [ 2202.841126][ T3822] ? ns_capable+0x89/0xf0 [ 2202.845480][ T3822] ? __pfx_do_new_mount+0x10/0x10 [ 2202.850532][ T3822] __se_sys_mount+0x2d9/0x3c0 [ 2202.855230][ T3822] ? __pfx___se_sys_mount+0x10/0x10 [ 2202.860446][ T3822] ? do_syscall_64+0x108/0x240 [ 2202.865232][ T3822] ? __x64_sys_mount+0x20/0xc0 [ 2202.870025][ T3822] do_syscall_64+0xf9/0x240 [ 2202.874558][ T3822] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2202.880477][ T3822] RIP: 0033:0x7f681447dda9 [ 2202.884904][ T3822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2202.904525][ T3822] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2202.912955][ T3822] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2202.920944][ T3822] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2202.928932][ T3822] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2202.936918][ T3822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2202.944898][ T3822] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2202.952897][ T3822] 10:16:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 23) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2203.340947][ T3541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2203.400830][ T3538] veth0_vlan: entered promiscuous mode [ 2203.467015][ T3538] veth1_vlan: entered promiscuous mode [ 2203.669890][ T3538] veth0_macvtap: entered promiscuous mode [ 2203.720999][ T3538] veth1_macvtap: entered promiscuous mode [ 2203.769614][ T3837] fuse: Bad value for 'fd' 10:16:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2203.825331][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2203.894136][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2203.936069][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2203.975951][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.014337][ T3843] FAULT_INJECTION: forcing a failure. [ 2204.014337][ T3843] name failslab, interval 1, probability 0, space 0, times 0 [ 2204.036158][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2204.103568][ T3843] CPU: 0 PID: 3843 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2204.113978][ T3843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2204.124086][ T3843] Call Trace: [ 2204.127418][ T3843] [ 2204.130388][ T3843] dump_stack_lvl+0x1e7/0x2e0 [ 2204.135140][ T3843] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2204.140401][ T3843] ? __pfx__printk+0x10/0x10 [ 2204.145052][ T3843] ? __pfx___might_resched+0x10/0x10 [ 2204.150398][ T3843] ? __mutex_unlock_slowpath+0x21c/0x750 [ 2204.156174][ T3843] should_fail_ex+0x3ae/0x4e0 [ 2204.160915][ T3843] ? __list_lru_init+0xad/0x5e0 [ 2204.165830][ T3843] should_failslab+0x9/0x20 [ 2204.170388][ T3843] __kmalloc+0xe6/0x490 [ 2204.174615][ T3843] __list_lru_init+0xad/0x5e0 [ 2204.179362][ T3843] alloc_super+0x7c8/0x8f0 [ 2204.183832][ T3843] sget_fc+0x269/0x780 [ 2204.187949][ T3843] ? __pfx_set_anon_super_fc+0x10/0x10 [ 2204.193456][ T3843] ? __pfx_fuse_fill_super+0x10/0x10 [ 2204.198794][ T3843] get_tree_nodev+0x2a/0x140 [ 2204.203444][ T3843] fuse_get_tree+0x350/0x4b0 [ 2204.208108][ T3843] vfs_get_tree+0x90/0x2a0 [ 2204.212591][ T3843] do_new_mount+0x2be/0xb40 [ 2204.217151][ T3843] ? ns_capable+0x89/0xf0 [ 2204.221547][ T3843] ? __pfx_do_new_mount+0x10/0x10 [ 2204.226636][ T3843] __se_sys_mount+0x2d9/0x3c0 [ 2204.231370][ T3843] ? __pfx___se_sys_mount+0x10/0x10 [ 2204.236629][ T3843] ? do_syscall_64+0x108/0x240 [ 2204.241457][ T3843] ? __x64_sys_mount+0x20/0xc0 [ 2204.246276][ T3843] do_syscall_64+0xf9/0x240 [ 2204.250843][ T3843] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2204.256790][ T3843] RIP: 0033:0x7f681447dda9 [ 2204.261268][ T3843] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2204.280924][ T3843] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2204.289397][ T3843] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2204.297425][ T3843] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2204.305445][ T3843] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2204.313469][ T3843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2204.321495][ T3843] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2204.329545][ T3843] [ 2204.334658][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.366028][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2204.384630][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.410502][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2204.450994][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:16:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 24) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2204.495967][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2204.542574][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.577382][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2204.625980][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.668651][ T3538] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2204.676791][ T3856] fuse: Bad value for 'fd' [ 2204.737860][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 10:16:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2204.778501][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.846474][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2204.875336][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.913701][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2204.955740][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2204.972436][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2205.008609][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2205.039841][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2205.052700][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2205.069616][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2205.086467][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2205.107120][ T3538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2205.130185][ T3538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2205.134498][ T3864] FAULT_INJECTION: forcing a failure. [ 2205.134498][ T3864] name failslab, interval 1, probability 0, space 0, times 0 [ 2205.158282][ T3864] CPU: 0 PID: 3864 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2205.168692][ T3864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2205.178794][ T3864] Call Trace: [ 2205.182110][ T3864] [ 2205.185083][ T3864] dump_stack_lvl+0x1e7/0x2e0 [ 2205.189815][ T3864] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2205.195059][ T3864] ? __pfx__printk+0x10/0x10 [ 2205.199702][ T3864] ? __pfx___might_resched+0x10/0x10 [ 2205.205050][ T3864] ? __asan_memset+0x23/0x50 [ 2205.209696][ T3864] should_fail_ex+0x3ae/0x4e0 [ 2205.214418][ T3864] ? fuse_dev_alloc+0x52/0x250 [ 2205.219219][ T3864] should_failslab+0x9/0x20 [ 2205.223760][ T3864] kmalloc_trace+0x76/0x360 [ 2205.228325][ T3864] fuse_dev_alloc+0x52/0x250 [ 2205.232970][ T3864] fuse_fill_super_common+0x4f4/0x11c0 [ 2205.238499][ T3864] ? __pfx_fuse_fill_super_common+0x10/0x10 [ 2205.244453][ T3864] ? __init_swait_queue_head+0xae/0x150 [ 2205.250052][ T3864] ? shrinker_register+0x160/0x230 [ 2205.255210][ T3864] ? sget_fc+0x6ec/0x780 [ 2205.259494][ T3864] fuse_fill_super+0x17c/0x1f0 [ 2205.264295][ T3864] ? __pfx_fuse_fill_super+0x10/0x10 [ 2205.269621][ T3864] get_tree_nodev+0xb7/0x140 [ 2205.274252][ T3864] fuse_get_tree+0x350/0x4b0 [ 2205.278889][ T3864] vfs_get_tree+0x90/0x2a0 [ 2205.283350][ T3864] do_new_mount+0x2be/0xb40 [ 2205.287896][ T3864] ? ns_capable+0x89/0xf0 [ 2205.292276][ T3864] ? __pfx_do_new_mount+0x10/0x10 [ 2205.297354][ T3864] __se_sys_mount+0x2d9/0x3c0 [ 2205.302091][ T3864] ? __pfx___se_sys_mount+0x10/0x10 [ 2205.307337][ T3864] ? do_syscall_64+0x108/0x240 [ 2205.312153][ T3864] ? __x64_sys_mount+0x20/0xc0 [ 2205.316966][ T3864] do_syscall_64+0xf9/0x240 [ 2205.321523][ T3864] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2205.327464][ T3864] RIP: 0033:0x7f681447dda9 [ 2205.331920][ T3864] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2205.351574][ T3864] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2205.360039][ T3864] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2205.368047][ T3864] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2205.376049][ T3864] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2205.384059][ T3864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2205.392067][ T3864] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2205.400114][ T3864] [ 2205.407810][ T3538] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2205.533701][ T3538] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.550000][ T3538] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.559587][ T3538] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.568411][ T3538] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2205.592798][ T3541] veth0_vlan: entered promiscuous mode 10:16:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 25) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2205.692127][ T3541] veth1_vlan: entered promiscuous mode 10:16:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2205.927018][ T3541] veth0_macvtap: entered promiscuous mode [ 2206.001493][ T3541] veth1_macvtap: entered promiscuous mode [ 2206.065069][ T3878] FAULT_INJECTION: forcing a failure. [ 2206.065069][ T3878] name failslab, interval 1, probability 0, space 0, times 0 [ 2206.102657][ T943] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2206.110838][ T3878] CPU: 0 PID: 3878 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2206.121198][ T3878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2206.121221][ T3878] Call Trace: [ 2206.121243][ T3878] [ 2206.121253][ T3878] dump_stack_lvl+0x1e7/0x2e0 [ 2206.121294][ T3878] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2206.121325][ T3878] ? __pfx__printk+0x10/0x10 [ 2206.152167][ T3878] ? __pfx___might_resched+0x10/0x10 [ 2206.157521][ T3878] should_fail_ex+0x3ae/0x4e0 [ 2206.162274][ T3878] ? fuse_dev_alloc+0x92/0x250 [ 2206.167102][ T3878] should_failslab+0x9/0x20 [ 2206.171678][ T3878] kmalloc_trace+0x76/0x360 [ 2206.176244][ T3878] ? fuse_dev_alloc+0x52/0x250 [ 2206.181072][ T3878] fuse_dev_alloc+0x92/0x250 [ 2206.185810][ T3878] fuse_fill_super_common+0x4f4/0x11c0 [ 2206.191333][ T3878] ? __pfx_fuse_fill_super_common+0x10/0x10 [ 2206.197279][ T3878] ? __init_swait_queue_head+0xae/0x150 [ 2206.202882][ T3878] ? shrinker_register+0x160/0x230 [ 2206.208047][ T3878] ? sget_fc+0x6ec/0x780 [ 2206.212425][ T3878] fuse_fill_super+0x17c/0x1f0 [ 2206.217241][ T3878] ? __pfx_fuse_fill_super+0x10/0x10 [ 2206.222577][ T3878] get_tree_nodev+0xb7/0x140 [ 2206.227211][ T3878] fuse_get_tree+0x350/0x4b0 [ 2206.231845][ T3878] vfs_get_tree+0x90/0x2a0 [ 2206.236331][ T3878] do_new_mount+0x2be/0xb40 [ 2206.240889][ T3878] ? ns_capable+0x89/0xf0 [ 2206.245287][ T3878] ? __pfx_do_new_mount+0x10/0x10 [ 2206.250384][ T3878] __se_sys_mount+0x2d9/0x3c0 [ 2206.255128][ T3878] ? __pfx___se_sys_mount+0x10/0x10 [ 2206.260385][ T3878] ? do_syscall_64+0x108/0x240 [ 2206.265212][ T3878] ? __x64_sys_mount+0x20/0xc0 [ 2206.270035][ T3878] do_syscall_64+0xf9/0x240 [ 2206.274606][ T3878] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2206.280562][ T3878] RIP: 0033:0x7f681447dda9 [ 2206.285029][ T3878] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2206.304687][ T3878] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2206.313162][ T3878] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2206.321183][ T3878] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2206.329239][ T3878] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2206.337272][ T3878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2206.345292][ T3878] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2206.353418][ T3878] [ 2206.366366][ T943] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2206.499653][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 10:16:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 26) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2206.546261][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.556826][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2206.577479][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.596026][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2206.635317][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.663378][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2206.695983][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.725924][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2206.756017][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.775527][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2206.805463][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.836164][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2206.865968][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.897269][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 10:16:53 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2206.945959][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2206.977417][ T3541] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2207.021993][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.062140][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2207.086499][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.106075][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2207.118290][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.132670][ T3895] FAULT_INJECTION: forcing a failure. [ 2207.132670][ T3895] name failslab, interval 1, probability 0, space 0, times 0 [ 2207.176000][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2207.204886][ T3895] CPU: 0 PID: 3895 Comm: syz-executor.2 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2207.215305][ T3895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2207.225418][ T3895] Call Trace: [ 2207.228750][ T3895] [ 2207.231726][ T3895] dump_stack_lvl+0x1e7/0x2e0 [ 2207.236468][ T3895] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2207.241728][ T3895] ? __pfx__printk+0x10/0x10 [ 2207.246385][ T3895] ? __pfx___might_resched+0x10/0x10 [ 2207.251736][ T3895] should_fail_ex+0x3ae/0x4e0 [ 2207.256480][ T3895] should_failslab+0x9/0x20 [ 2207.261041][ T3895] kmalloc_node_trace+0x7e/0x3a0 [ 2207.266038][ T3895] ? bdi_alloc+0x4f/0x140 [ 2207.270430][ T3895] bdi_alloc+0x4f/0x140 [ 2207.274634][ T3895] super_setup_bdi_name+0xb0/0x200 [ 2207.279806][ T3895] ? __pfx_lock_release+0x10/0x10 [ 2207.284896][ T3895] ? __pfx_super_setup_bdi_name+0x10/0x10 [ 2207.290676][ T3895] ? do_raw_spin_unlock+0x13b/0x8b0 [ 2207.295945][ T3895] fuse_fill_super_common+0x641/0x11c0 [ 2207.301484][ T3895] ? __pfx_fuse_fill_super_common+0x10/0x10 [ 2207.307451][ T3895] ? __init_swait_queue_head+0xae/0x150 [ 2207.313066][ T3895] ? shrinker_register+0x160/0x230 [ 2207.318235][ T3895] ? sget_fc+0x6ec/0x780 [ 2207.322531][ T3895] fuse_fill_super+0x17c/0x1f0 [ 2207.327348][ T3895] ? __pfx_fuse_fill_super+0x10/0x10 [ 2207.332684][ T3895] get_tree_nodev+0xb7/0x140 [ 2207.337321][ T3895] fuse_get_tree+0x350/0x4b0 [ 2207.341962][ T3895] vfs_get_tree+0x90/0x2a0 [ 2207.346440][ T3895] do_new_mount+0x2be/0xb40 [ 2207.350995][ T3895] ? ns_capable+0x89/0xf0 [ 2207.355385][ T3895] ? __pfx_do_new_mount+0x10/0x10 [ 2207.360489][ T3895] __se_sys_mount+0x2d9/0x3c0 [ 2207.365252][ T3895] ? __pfx___se_sys_mount+0x10/0x10 [ 2207.370512][ T3895] ? do_syscall_64+0x108/0x240 [ 2207.375342][ T3895] ? __x64_sys_mount+0x20/0xc0 [ 2207.380176][ T3895] do_syscall_64+0xf9/0x240 [ 2207.384750][ T3895] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2207.390702][ T3895] RIP: 0033:0x7f681447dda9 10:16:53 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2207.395160][ T3895] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2207.414820][ T3895] RSP: 002b:00007f681511f0c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2207.423292][ T3895] RAX: ffffffffffffffda RBX: 00007f68145abf80 RCX: 00007f681447dda9 [ 2207.431317][ T3895] RDX: 0000000020002100 RSI: 00000000200020c0 RDI: 0000000000000000 [ 2207.439339][ T3895] RBP: 00007f681511f120 R08: 0000000020002140 R09: 0000000000000000 [ 2207.447362][ T3895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2207.455396][ T3895] R13: 000000000000000b R14: 00007f68145abf80 R15: 00007ffcc109fe28 [ 2207.463444][ T3895] [ 2207.470778][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.495948][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2207.505838][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.517350][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2207.527289][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.537863][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:16:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 27) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2207.547805][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.563262][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2207.576365][ T3541] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2207.587735][ T3541] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2207.599929][ T3541] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2207.637787][ T2812] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2207.646457][ T2812] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2207.651990][ T3541] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2207.697047][ T3541] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2207.705827][ T3541] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2207.792058][ T3541] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 10:16:54 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:16:54 executing program 0: syz_mount_image$btrfs(&(0x7f00000055c0), &(0x7f0000005600)='./bus\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="646973636172642c0008fd346f1fe0c7b977cf98b0dfc801ecf9a88e1ae482"], 0x1, 0x559d, &(0x7f0000005680)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x4c37e, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9}) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfd14) write$khugepaged_scan(r0, &(0x7f0000000040), 0x8) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 10:16:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2208.304979][T27368] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2208.331179][T27368] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2208.469276][T14911] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2208.505060][T14911] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 10:16:55 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000040), &(0x7f0000000200)='./bus\x00', 0x10108d4, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0], 0x5, 0x657, &(0x7f0000000240)="$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") r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x50009405, &(0x7f0000000280)) [ 2208.704344][ T3922] fuse: Bad value for 'fd' 10:16:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2209.092266][ T3930] fuse: Bad value for 'fd' 10:16:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:16:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x5, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2209.401400][ T3933] loop4: detected capacity change from 0 to 1024 [ 2209.419792][ T3936] fuse: Bad value for 'fd' 10:16:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2209.474880][ T3912] loop0: detected capacity change from 0 to 32768 [ 2209.529162][ T3912] BTRFS: device fsid a6a605fc-d5f1-4e66-8595-3726e2b761d6 devid 1 transid 8 /dev/loop0 scanned by syz-executor.0 (3912) [ 2209.611572][ T3912] BTRFS info (device loop0): first mount of filesystem a6a605fc-d5f1-4e66-8595-3726e2b761d6 [ 2209.646262][ T3912] BTRFS info (device loop0): using blake2b (blake2b-256-generic) checksum algorithm [ 2209.655783][ T3912] BTRFS info (device loop0): using free-space-tree 10:16:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x500, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) [ 2209.976855][ T28] audit: type=1800 audit(1707301016.294:1504): pid=3912 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=263 res=0 errno=0 10:16:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:16:56 executing program 0: syz_mount_image$btrfs(&(0x7f00000055c0), &(0x7f0000005600)='./bus\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="646973636172642c0008fd346f1fe0c7b977cf98b0dfc801ecf9a88e1ae482"], 0x1, 0x559d, &(0x7f0000005680)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x4c37e, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9}) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfd14) write$khugepaged_scan(r0, &(0x7f0000000040), 0x8) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 2210.314115][ T3538] BTRFS info (device loop0): last unmount of filesystem a6a605fc-d5f1-4e66-8595-3726e2b761d6 10:16:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x1020, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:16:57 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/net', 0x20000, 0x100) 10:16:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:16:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x2000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:16:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x2010, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2212.293522][ T3994] loop0: detected capacity change from 0 to 32768 [ 2212.332479][ T3994] BTRFS: device fsid a6a605fc-d5f1-4e66-8595-3726e2b761d6 devid 1 transid 8 /dev/loop0 scanned by syz-executor.0 (3994) [ 2212.375431][ T3994] BTRFS info (device loop0): first mount of filesystem a6a605fc-d5f1-4e66-8595-3726e2b761d6 [ 2212.399088][ T3994] BTRFS info (device loop0): using blake2b (blake2b-256-generic) checksum algorithm [ 2212.418488][ T3994] BTRFS info (device loop0): using free-space-tree [ 2212.698302][ T28] audit: type=1800 audit(1707301019.014:1505): pid=3994 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=263 res=0 errno=0 [ 2212.947590][ T3538] BTRFS info (device loop0): last unmount of filesystem a6a605fc-d5f1-4e66-8595-3726e2b761d6 [ 2222.259448][ T1241] ieee802154 phy0 wpan0: encryption failed: -22 [ 2222.265824][ T1241] ieee802154 phy1 wpan1: encryption failed: -22 10:17:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000ac051e599c"]) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) read$FUSE(r0, &(0x7f0000004400)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) read$FUSE(r0, &(0x7f0000006440)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, r3}, 0x10) (async) fcntl$addseals(r0, 0x409, 0x8) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) r4 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$6lowpan_enable(r4, &(0x7f0000000080)='0', 0x1) 10:17:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) fcntl$dupfd(r0, 0x0, r0) 10:17:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x5000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:19 executing program 0: syz_mount_image$btrfs(&(0x7f00000055c0), &(0x7f0000005600)='./bus\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="646973636172642c0008fd346f1fe0c7b977cf98b0dfc801ecf9a88e1ae482"], 0x1, 0x559d, &(0x7f0000005680)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x4c37e, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9}) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xfd14) write$khugepaged_scan(r0, &(0x7f0000000040), 0x8) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 10:17:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x20000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) fcntl$dupfd(r0, 0x0, r0) [ 2233.661717][ T4037] fuse: Bad value for 'source' 10:17:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x20100000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2234.186534][ T4029] loop0: detected capacity change from 0 to 32768 [ 2234.228529][ T4029] BTRFS: device fsid a6a605fc-d5f1-4e66-8595-3726e2b761d6 devid 1 transid 8 /dev/loop0 scanned by syz-executor.0 (4029) [ 2234.262668][ T4029] BTRFS info (device loop0): first mount of filesystem a6a605fc-d5f1-4e66-8595-3726e2b761d6 [ 2234.289092][ T4029] BTRFS info (device loop0): using blake2b (blake2b-256-generic) checksum algorithm [ 2234.326127][ T4029] BTRFS info (device loop0): using free-space-tree [ 2234.335456][ T4045] fuse: Bad value for 'source' 10:17:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x8cffffff, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) fcntl$dupfd(r0, 0x0, r0) 10:17:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2234.611199][ T28] audit: type=1800 audit(1707301040.924:1506): pid=4029 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="loop0" ino=263 res=0 errno=0 10:17:21 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x12841, 0x0) [ 2234.830913][ T3538] BTRFS info (device loop0): last unmount of filesystem a6a605fc-d5f1-4e66-8595-3726e2b761d6 10:17:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xf6ffffff, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:22 executing program 0: mount$overlay(0x0, 0x0, 0x0, 0x112400, 0x0) 10:17:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) fcntl$dupfd(r0, 0x0, r0) 10:17:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xf9fdffff, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2235.945423][T21762] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 2235.964061][T21762] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 2235.975060][T21762] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 2235.984004][T21762] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 2235.999651][T21762] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 2236.007998][T21762] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 10:17:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20141, 0x0) statx(0xffffffffffffff9c, &(0x7f000001a640)='./file0\x00', 0x0, 0x10, &(0x7f000001a680)) 10:17:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xfffffdf9, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2236.676308][ T4092] fuse: Bad value for 'fd' 10:17:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:23 executing program 0: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$smackfs_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='[\" ] r-bk '], 0xa) 10:17:23 executing program 4: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$smackfs_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='[- ] -'], 0xa) [ 2236.878422][ T4079] chnl_net:caif_netlink_parms(): no params data found [ 2237.175329][ T4079] bridge0: port 1(bridge_slave_0) entered blocking state [ 2237.182696][ T4079] bridge0: port 1(bridge_slave_0) entered disabled state [ 2237.191138][ T4079] bridge_slave_0: entered allmulticast mode [ 2237.199536][ T4079] bridge_slave_0: entered promiscuous mode [ 2237.216382][ T4079] bridge0: port 2(bridge_slave_1) entered blocking state 10:17:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xffffff8c, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2237.223676][ T4079] bridge0: port 2(bridge_slave_1) entered disabled state [ 2237.231697][ T4079] bridge_slave_1: entered allmulticast mode [ 2237.246978][ T4103] fuse: Bad value for 'fd' [ 2237.253227][ T4079] bridge_slave_1: entered promiscuous mode 10:17:23 executing program 0: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$smackfs_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='[\" ] rAGk '], 0xa) 10:17:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2237.370271][ T4079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2237.435491][ T4079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2237.569893][ T4079] team0: Port device team_slave_0 added [ 2237.591192][ T4079] team0: Port device team_slave_1 added 10:17:24 executing program 0: r0 = openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000001040)='/sys/fs/smackfs/access2\x00', 0x2, 0x0) write$smackfs_access(r0, &(0x7f0000000000)={'W\x7f\xa5\x16O\xda\xa3\x82R\x11\xcb0\x97\xf4\xd0\x03B$\xd5\x18[F\xb4l\x01i\xb3\x86\x06,C\xaa\n\xa0y\x01.\x9a\xef\xf0\xe7\xf8\x1ac\xbe\x16\xee\xb1\xba\xa4\xbcdp\xf5\xfaF\xb8\xc7/\rLZ\x90B\x05\xa0\xc2\xd9\xc2$IK>X\xaa|\xb3\x1e\xf7\x81\xbb\xaf,\xdf\x9e\xe6\xa76', 0x20, '', 0x20, 'rwbl'}, 0x5f) 10:17:24 executing program 4: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$smackfs_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='[- ] rlb'], 0xa) [ 2237.808830][ T4079] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2237.816153][ T4079] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2237.884790][ T4079] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2237.907614][ T4112] fuse: Bad value for 'fd' 10:17:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xfffffff6, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2237.949037][ T4079] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2237.966750][ T4079] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2238.010994][ T4079] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 10:17:24 executing program 0: r0 = openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000001040)='/sys/fs/smackfs/access2\x00', 0x2, 0x0) write$smackfs_access(r0, &(0x7f0000001080)={'', 0x20, '', 0x20, 'rwbl'}, 0x7) [ 2238.096816][ T1362] Bluetooth: hci8: command 0x0409 tx timeout [ 2238.167891][ T4079] hsr_slave_0: entered promiscuous mode [ 2238.199980][ T4079] hsr_slave_1: entered promiscuous mode [ 2238.232448][ T4079] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2238.250168][ T4079] Cannot create hsr debugfs directory [ 2238.449784][ T4116] fuse: Invalid rootmode 10:17:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:24 executing program 0: r0 = openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000001040)='/sys/fs/smackfs/access2\x00', 0x2, 0x0) write$smackfs_access(r0, &(0x7f0000001080)={'', 0x20, '', 0x20, 'rwbl'}, 0x1000000000000) 10:17:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x8000000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2238.764723][ T4079] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:17:25 executing program 4: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$smackfs_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='[\" ] b-Gk '], 0xa) [ 2238.890608][ T4079] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:17:25 executing program 0: r0 = openat$smackfs_load(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/load-self2\x00', 0x2, 0x0) write$smackfs_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='[- ] rwX'], 0xa) [ 2239.118950][ T4127] fuse: Invalid rootmode [ 2239.138287][ T4079] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:17:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:17:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x500000000000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2239.302334][ T4079] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:17:25 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000002280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}, 0x0, 0x0, 0x0) [ 2239.696497][ T1362] Bluetooth: hci2: command 0x0406 tx timeout 10:17:26 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000002880)='/proc/crypto\x00', 0x0, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) [ 2239.847489][ T4079] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2239.883687][ T4079] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2239.923943][ T4136] fuse: Invalid rootmode [ 2239.959030][ T4079] netdevsim netdevsim1 netdevsim2: renamed from eth2 10:17:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) [ 2240.007166][ T4079] netdevsim netdevsim1 netdevsim3: renamed from eth3 10:17:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x2000000000000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r0, &(0x7f0000002540)={0x18, 0x0, r1}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2240.186632][ T1362] Bluetooth: hci8: command 0x041b tx timeout [ 2240.390593][ T4079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2240.427787][ T4079] 8021q: adding VLAN 0 to HW filter on device team0 [ 2240.459417][T28473] bridge0: port 1(bridge_slave_0) entered blocking state [ 2240.466720][T28473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2240.515558][T14911] bridge0: port 2(bridge_slave_1) entered blocking state [ 2240.522812][T14911] bridge0: port 2(bridge_slave_1) entered forwarding state 10:17:27 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002880)='/proc/crypto\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000008980)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f000000a9c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000028c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004900)={0x2020}, 0x2020) [ 2240.635230][ T4079] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2240.658178][ T4079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 10:17:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) 10:17:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x2010000000000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r0, &(0x7f0000002540)={0x18, 0x0, r1}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2241.021889][ T4079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2241.124729][ T4079] veth0_vlan: entered promiscuous mode [ 2241.151630][ T4079] veth1_vlan: entered promiscuous mode [ 2241.207124][ T4079] veth0_macvtap: entered promiscuous mode [ 2241.227834][ T4079] veth1_macvtap: entered promiscuous mode [ 2241.292503][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.317122][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.328887][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.346443][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.365973][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.380105][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.394155][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.404774][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.417898][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.429020][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.440619][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.453032][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.464083][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.505917][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.546085][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 10:17:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) 10:17:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x8cffffff00000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2241.590532][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.612453][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2241.645264][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.673097][ T4079] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2241.714312][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.738036][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:17:28 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002880)='/proc/crypto\x00', 0x0, 0x0) mmap$binder(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1, 0x11, r0, 0x0) [ 2241.758801][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.772302][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.785621][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.797228][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.809079][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.827205][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.840583][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.860343][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.877470][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.895373][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.916080][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.927268][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.939004][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.956047][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2241.969086][ T4079] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2241.991010][ T4079] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2242.021302][ T4079] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2242.051120][ T4079] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2242.073633][ T4079] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2242.109394][ T4079] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 10:17:28 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000028c0)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000027c0), 0x1, 0x0) [ 2242.159741][ T4079] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 10:17:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xf6ffffff00000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2242.266234][ T1362] Bluetooth: hci8: command 0x040f tx timeout [ 2242.478236][ T2812] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2242.504209][ T2812] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 10:17:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r0, &(0x7f0000002540)={0x18, 0x0, r1}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2242.613050][T10959] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2242.634060][T10959] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 10:17:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000ac051e599c"]) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) read$FUSE(r0, &(0x7f0000004400)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) read$FUSE(r0, &(0x7f0000006440)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, r3}, 0x10) (async) fcntl$addseals(r0, 0x409, 0x8) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) r4 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$6lowpan_enable(r4, &(0x7f0000000080)='0', 0x1) 10:17:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 10:17:29 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8000e8, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, 0x0) 10:17:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xf9fdffff00000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000ac051e599c"]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) read$FUSE(r0, &(0x7f0000004400)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000006440)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, r3}, 0x10) fcntl$addseals(r0, 0x409, 0x8) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) r4 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$6lowpan_enable(r4, &(0x7f0000000080)='0', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000ac051e599c"]) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) (async) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) read$FUSE(r0, &(0x7f0000004400)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) read$FUSE(r0, &(0x7f0000006440)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10, 0x0, r3}, 0x10) (async) fcntl$addseals(r0, 0x409, 0x8) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) (async) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$6lowpan_enable(r4, &(0x7f0000000080)='0', 0x1) (async) 10:17:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xffffffff00000000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x5, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:30 executing program 4: syz_io_uring_setup(0x1326, &(0x7f0000000000)={0x0, 0x0, 0x422}, 0x0, 0x0) 10:17:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r0, &(0x7f0000002540)={0x18, 0x0, r1}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:17:30 executing program 3: r0 = openat$smackfs_access(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/smackfs/access\x00', 0x2, 0x0) write$smackfs_access(r0, &(0x7f00000000c0)=ANY=[], 0xc) write$smackfs_access(r0, 0x0, 0x0) 10:17:30 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/time\x00') [ 2244.336312][ T1362] Bluetooth: hci8: command 0x0419 tx timeout 10:17:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:17:30 executing program 3: syz_mount_image$exfat(&(0x7f00000000c0), &(0x7f0000001540)='./file0\x00', 0x2000004c, &(0x7f0000000440)=ANY=[@ANYBLOB="696f636861727333593e4bdd14a5d1de65743d61736369692c646973636172642c646d61736b3d30303030303030303030303030303030303030303030372c7569643d", @ANYRESHEX, @ANYBLOB="2c646d61736b3d30303000303030303030303030303030303030303135322c696f636861de8eb0db3d690400383835392d312c6769643d", @ANYRESHEX, @ANYBLOB="2c616c6c6f775f7574696d653d30303030303030303030303030303030303030303030372c646973636172642c000efb3cb2dff2183a624278f3cc9a27e5bdbdb6ce2415d93a9017589563ddcdb5c94100c2679411be0dbb0a51a100ef9419a58ef5ec1c7ec04041bb0c9cbad4b35f8e2b6973804d754e870ead212a6dc9952469ec95937adab76c421f529bfa623e6bc3a734b85936862f2318174fab9a4ed19e"], 0x1, 0x14f5, &(0x7f0000001580)="$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") r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x89901) move_mount(r0, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) [ 2244.813222][ T4209] loop3: detected capacity change from 0 to 256 [ 2244.852662][ T4209] exfat: Unknown parameter 'iochars3Y>Ket' 10:17:31 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0, 0x0) [ 2244.917541][ T4036] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 10:17:31 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/time\x00') 10:17:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x500, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:31 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280)={[0x2]}, 0x8}) 10:17:31 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x8}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0xe4]}, 0x8}) 10:17:31 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000e80), 0x0, 0x0) 10:17:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:17:32 executing program 3: quotactl$Q_SETINFO(0x0, &(0x7f0000000600)=@sr0, 0x0, 0x0) 10:17:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x1020, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:32 executing program 3: r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 10:17:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x300, 0x0) 10:17:32 executing program 3: r0 = open(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00', 0x121342, 0x0) write$tcp_mem(r0, &(0x7f0000000080)={0x2, 0x2c, 0x0, 0x2c, 0x0, 0x2c}, 0x48) 10:17:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x490420}}, 0x50) 10:17:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:17:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2010, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:33 executing program 4: open$dir(&(0x7f0000000400)='./file0\x00', 0x708, 0x0) 10:17:33 executing program 3: open$dir(&(0x7f0000000240)='./file0\x00', 0x200, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 10:17:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:17:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x5000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:34 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x7b9, 0x0) 10:17:34 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./file0/../file0\x00', r0, &(0x7f00000000c0)='./file0/../file0\x00') 10:17:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2265.305345][T21762] Bluetooth: hci1: command 0x0406 tx timeout 10:17:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="290000000300000000e60000000000000100000000000000080000000000000067726f75705f696400"], 0x29) 10:17:59 executing program 3: open$dir(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000000c0)='\x00', 0x2000000, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 10:17:59 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:17:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000a00)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000a40)='./file0\x00', 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0/file0\x00') 10:17:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x20000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:17:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x80a, &(0x7f00000000c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303030352c6572726f72733d72656d6f756e742d726f2c61626f72742c6e6f646973636172642c7573726a71756f74613d2c0060dd77d3b57cb51b3c8afb3e915d9b6a806a701b55723ae58fdffca04da07fc313bff220cb7579c42956c892c9b3f8223dc9060f9cebac67ba7139c061564b8a90336ba3ac631357fa8e5c20dd38ec10f0bd9fc7b44b538e83f88a0e1cd8aa93cae66d93b1835a1060312e7a727a7112d734e3cafe40da82a189970c4abcaacbec5d4136f1a37bc7586d8a0308331c54c09c9427574080e49411ffbb9e4ede84105f187ed4aa7b6e484341a50908dc364319930696c5f2d71ceabc14020677b9001ca75f0c30f21471c6e443f7b5b6fdb6ad06000000ae0cd3890af3bb48739fc4f2b30d7bca9d9ef396fb88f9ec1ace0ea225a90dcd9ec5b54ec0fd246d4683904225332c83654d0245ec5de5cb68869aee0f912ffdccd36af64cb06f4b2802f752da180350935a32a2c6905a5400a61d275284b59eab58471a333d8812e05beb9e77e9256de3dc850cc19f85e80e269977108cd4f5065f9ffb87bfdf94a6f5b6bca25ddb4e96548c051459e8ac12645f351b707634051b45a7ac74377dc0644ee455ed9379a83b2cb33cdf5bcaa091bb0000000000001dc50fab359746645197c9dd052a8a2291c10b18951c33cd9e00bf0000000000000000faff000000000000c3194a842ffe6eaab451571e11c43023a1cfc3cb4abce227c8914711c09333ed74346d154d78325e6d93ec4c4d7c2d63351a3a24452397ebec2d4db02b56ed915acf41889eb9a9048cd66e7bd66d836f1b64dda4bac7c8509c880fd9e67147b4668757b3ff4ac9a20604295904df6ff685cc8b32e27fde359b2c215d438a7e4404e8109a0c521cc5de52e28887d88e6ec6f92e266ecdd95f9531885c0b4c06bf8d253dbcea81f9c78ae1baf52ce52b1742fe2ced54f8c793d4b3a1014cc6a78939526317d91ae480dd1d2a67ae643792ec4165c7e097043a2fcdd145873c366e87c9b938ef5857fe3d2d0f68dba06342de8adb7082508157952628f2eff00ad37399d600d8c5bc03700c7a7855c33590362b6b2fedbc2a130546528d5867dbf4d9587104c56e9e4314a37f7a7619065b54975c6d0e07adb4b4b76abdd275e6ce739a70990d", @ANYRESHEX=0x0], 0x1, 0x796, &(0x7f0000000c40)="$eJzs3c9rHFUcAPDvbJImTauNINh6aU5aKN20NbYKghEPIlgo6Nk2bLYhZpMt2U1pQg4WEQQRtHgQ9OLZH/XmVfTs3+BFRFqqpsWKB1mZ/ZFs82OTtNls23w+MMn7zr7Je9+dnTdvM8NuALvWYPojE3EoIj5OIg7U1ycR0VMtdUeM1OrdWVzIpUsSlcqbfybVOrcXF3LRtE1qXz04GBE/vh9xNLO63dLc/ORooZCfqcdD5amLQ6W5+WMTU6Pj+fH89KkTw8MnTz9/+tT25fr3z/P7b3zy2rPfjvz73lPXPvopiZHYX3+sOY/tMhiD9eekJ30K7/LqdjfWYUmnO8A9SQ/NrtpRHofiQHRVSwDAoyw9/1cAgF0mcf4HgF2m8X+A24sLucbS2f9I7Kybr0REXy3/xvXN2iPd9Wt2fdXroP23k+iuXxGNbbzeNRgRX3z/9tfpEm26DgmwlnevRMT5gcHV43+y6p6FrTq+iTqDK2LjH+ycH9L5zwtrzf8yS/OfWJr/LOtd49i9F4MRe5rj1cd/5vqaG768DY3X538v1e5tSxNtmv8t3bQ20FWPHkuDwxExUcinY9vjEXEkenovTBTyJ1q0ceTWf7fWe6x5/vfX1Xe+SttPfy/XyFzv7r17m7HR8uj95Nzs5pWIp7uX7+27s2r876vOdVfu/3Td2VZ/+PBy8fUXP/h8vWpp/mm+jWV1/u1V+TLimVg7/4ak5f2JQ+nuP177uXYb3/36Wf967Tfv/3RJ22+8F9gJ6f7vb53/QNJ8v2Zpe9vfOP+1X/97kreq5cbgcXm0XJ45EbEneWP1+pPL2zbiRv00/1qmK/PPtHz9p+8Ez28yx+4bf3xz7/m3V5r/2Jb2/9YL1+5Mdq3X/ub2/3C1dKS+ZjPj32Y7eD/PHQAAAAAAAAAAAAAAAAAAAAAAAABsViYi9keSyS6VM5lstvYd3k9Gf6ZQLJWPXijOTo9F9buyB6In0/ioywO1OGl8/ulAU3xyRfxcRDwREZ/27q3G2VyxMNbp5AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgbt863/+f+r23070DANqmb8Mat/J3hZVKpdLG/gAA7bfx+R8AeNS0OP/v3cl+AAA7x/t/ANh9nP8BYPdx/gcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDNzp45ky6VfxYXcmk8dmludrJ46dhYvjSZnZrNZXPFmYvZ8WJxvJDP5opTG/29QrF4cTimZy8PlfOl8lBpbv7cVHF2unxuYmp0PH8u37MjWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA1pTm5idHC4X8zCNR+DAiHoButKOQxAPRjY4Ufjv2y8FWda5u8DIeeSCyeMgKnR6ZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4O/wcAAP//PiglpQ==") r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) 10:17:59 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2273.257402][ T4268] fuse: Bad value for 'fd' 10:17:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x490420}}, 0x50) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x7) [ 2273.812758][ T4276] loop3: detected capacity change from 0 to 2048 [ 2273.914085][ T4276] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 2273.938438][ T4278] fuse: Bad value for 'fd' 10:18:00 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2273.966843][ T4276] EXT4-fs error (device loop3): ext4_find_extent:936: inode #2: comm syz-executor.3: pblk 1 bad header/extent: invalid magic - magic 2, entries 0, max 3(0), depth 0(4) 10:18:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000140)) [ 2274.033626][ T4276] EXT4-fs (loop3): Remounting filesystem read-only 10:18:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x20100000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2274.157632][ T3049] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2274.530121][ T4286] fuse: Bad value for 'fd' 10:18:00 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2274.631021][ T4289] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 0 (only 8 groups) 10:18:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000140)) 10:18:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x8cffffff, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2275.169058][ T4294] fuse: Bad value for 'fd' 10:18:01 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:01 executing program 4: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000180)='./bus\x00', 0x40, &(0x7f0000003240)=ANY=[@ANYBLOB="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"], 0x1, 0xbee, &(0x7f0000000cc0)="$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") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) [ 2275.407074][ T4297] EXT4-fs warning (device sda1): verify_group_input:137: Cannot add at group 0 (only 8 groups) [ 2275.487556][T21762] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 [ 2275.504956][T21762] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 2275.519088][T21762] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 [ 2275.530437][T21762] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 2275.539134][T21762] Bluetooth: hci10: unexpected cc 0x0c25 length: 249 > 3 [ 2275.549307][T21762] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 10:18:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 10:18:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xf6ffffff, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2275.941224][ T4304] fuse: Bad value for 'fd' 10:18:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000280), r1, 0x0, 0x0, 0x1}}, 0x20) 10:18:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xf9fdffff, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2276.321034][ T4299] chnl_net:caif_netlink_parms(): no params data found [ 2276.484219][ T4315] fuse: Bad value for 'fd' 10:18:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:02 executing program 3: openat$vmci(0xffffffffffffff9c, &(0x7f0000000800), 0x2, 0x0) [ 2276.593405][ T4319] loop4: detected capacity change from 0 to 2048 [ 2276.720659][ T4319] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 2276.723986][ T4299] bridge0: port 1(bridge_slave_0) entered blocking state 10:18:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xfffffdf9, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2276.783417][ T4299] bridge0: port 1(bridge_slave_0) entered disabled state [ 2276.824741][ T4299] bridge_slave_0: entered allmulticast mode [ 2276.839436][ T4299] bridge_slave_0: entered promiscuous mode [ 2276.898626][ T4299] bridge0: port 2(bridge_slave_1) entered blocking state [ 2276.937095][ T4299] bridge0: port 2(bridge_slave_1) entered disabled state [ 2276.944437][ T4299] bridge_slave_1: entered allmulticast mode 10:18:03 executing program 4: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000180)='./bus\x00', 0x40, &(0x7f0000003240)=ANY=[@ANYBLOB="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"], 0x1, 0xbee, &(0x7f0000000cc0)="$eJzs3UFsHNd5B/DvDUmRkotk61iykxrB2gUcVWlUkootGwxQq2aJplFs1hSTtu7BK3GlbkUtFyTlyEabuCcfWqBsCvTSFChQpDB6CNhDDu0pBQr0ShS5FQXUNHVdFAX2ECOXwixm9i25kmiLMEVRkn8/QPoPZ7+3O/Peema4b8cKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACDiV371zPhEOuitAADuphfnXh6fdP4HgI+Vc37/BwAAAAAAAAAAAACAe12KIt6NFN94vJterX7uGTvbal+9Nj89s3Ozw6lqOVTVl3/GJiZPffHpZ04/288Pb3+nfTpemjt3pv7C0pXOcnNlpblQn2+3LiwtNHf9DHttf7MTVQfUr1y+unDx4kp98uSpGx6+Vntn9KFjtanTE68c7dfOT8/MzA3UDI985Fe/xQfd4XEoirgYKS6//W5qREQRe++L27x39tvhaidOVDsxPz1T7chiq9FeLR+c7XdEEVEbaPR8v4/uwljsST3izXLzyw0+Ue7eXKex3Di/2KzPNpZXW6utpfZs6m1tqsqLeDZFdCKiO3rr041EEd+MFG99p5vOR8RQvx8+X90YfPvtKfZhH3dhOCJqIxEbxX0wZvew0Sjie5Hi298ajwu5X6tueyriq2Uei7ha5vWItTI/G5HKN8gjEe/t8H7i/jIcRfxRpPjJVDct9Me+Oq6c/Vr9y+2LSwO1/ePKfX9+uJvu8WPTWBTRqI743fTRL3YAAAAAALj3FPGnkeKJHx5PnRicU2y1L9XPNc4v9j4V7n/2X8+tNjc3N2upl+M5Z3N2cq7lXM+5kbObs1bk9jlnc3ZyruVcz7mRs5uzNpTb55zN2cm5lnM950bObs7acG6fczZnJ+dazvWcGzm7wwc4XAAAAAAAAACwg8NRxNcjxVO/9Fp1X3FU96V/cur0yyd/ffCe8cdu8zxl7cmIWC92d0/uoXzr8GyaTemA7iGmd//fH+T7//7woDcGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4UEUU8WSkeO373RQpIuoRr0Yvr48e9NYBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB3wlgq4r1I8edfGat+3igifjsi3t98fzMirr+/eacd9B4DAAAAAAAAwAMoFfF6pHjy5W6qRcS12jujDx2rTZ2eeOXoUAxFKksG61+aO3em/sLSlc5yc2WluVCfb7cuLC00d/tyY2db7avX5qdn9mVnbuvwPm//4bEXljqvL7cu/e7qjo8fGTtzfmV1uXFh54fjcBQR9cE1J6oNnp+eqTZ6sdVoV01n0263GAAAAAAAAICPg5FUxPuR4q2/eXtr3nm4N+c/fHPtd78UUeTl6Tz/vDUNXX1v4BPV9wZ6y5+cOv0bk58ZXN5xyvpENaFen5+emZkbWD08cmvpWH7d8b3tMgPK8V+NFH/8l/X0RF534/gPbdV+9/e3x/vNm5/oA8Z8r+P/swPrytdMqYi/ixQ/95uPxRPVdh6JW74zkeu+Eil+a/3xXBeHyron8+MPV3+PXWwtNsfL2muR4h+v3lj7VK791HbtxK479j5Rjv+TkeJ/fmd9q2/y+OcR2B61wfH/zM3vjn0a/4cH1tXy6/78ndl1ImLl9TcuNxYXm8sWLFiwsLVw0Ecm7oby/P/1SPEPf/avW9c7+fz/M72ftq//fvrN7fP/1M1PtE/n/08NrJvKVyMjwxFjq1c6I49GjK28/sYXWlcal5qXmu1Tp597ZnL8uYnxUyOH+hd320t77qsHUTn+vxcpvvejv43P5XU3Xv/tfP1/5OYn2qfxf2Rg3ZEbrlf2vOvk8f+/SPHP0z+I43ndh13/93//P54vwreuz/dp/I8OrKt+x/tExC8MrDt+NOKB+6UMAAAA7rCUivhBnk8dv8186j9Fijf++xdzXTpW1j2fH69Vf4+9uNT+wpnFxaULjdXG+cVmfa7TuNAs2/44UnT/+vHctqjmV/vzzb053u252H+JFM/9Wr+2Nxfb/2zqke3aibL2ZKT4kxdvrO1/jnF0u3ayrP23SDHxys61x7ZrT5W1/xUpfvoX9X7tkbL2S7n20e3akxeWFhf2YVgAAAAAAGBPRlIRz0SKvz81nPqfb+/m+5+3fOi9T9//e3Rg3cJdul9lz50KAPe48vx/vDyr//Jfbc3l33j+3/7/AAye/282+O8GfNDyRzn/1+7MbgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB87KQoYilSfOPxbro+Wv7cM3a21b56bX56Zudmh1PVcqiqL/+MTUye+uLTz5x+tp8f3v5O+3S8NHfuTP2FpSud5ebKSnOhPt9uXVhaaO76Gfba/mYnqg6oX7l8deHixZX65MlTNzx8rfbO6EPHalOnJ1452q+dn56ZmRuoGR75yK9+i/QB6w9FEf8bKS6//W7699GIIvbeF7d57+y3w9VOnKh2Yn56ptqRxVajvVo+ONvviCKiNtDo+X4f3YWx2JN6xJvl5pcbfKLcvblOY7lxfrFZn20sr7ZWW0vt2dTb2lSVF/FsiuhERHf01qcbiSJGIsVb3+mmH41GDPX74fMvzr08Pnn77Sn2YR93YTgiaiMRG8V9MGb3sNEo4ulI8e1vjcd/jPb6teq2pyK+WuaxiKtlXo9YK/OzEal8gzwS8d4O7yfuL8NRxMOR4idT3fTj0Tz21XHl7NfqX25fXBqo7R9X7vvzw910jx+bxqKId6sjfjf9p/+eAQAAAAAeIEU8Fime+OHxVM0Pbs0pttqX6uca5xd7H+v3P/uv51abm5ubtdTL8ZyzOTs513Ku59zI2c1ZK3L7nLM5OznXcq7n3MjZzVkbyu1zzubs5FzLuZ5zI2c3Z204t885m7OTcy3nes6NnN3hgxwvAAAAAAAAgJ0VUcTnIsVr3++mzdHeBO+r0cvr7gd64P1/AAAA//9W5Vt6") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) [ 2276.994365][ T4299] bridge_slave_1: entered promiscuous mode 10:18:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:03 executing program 3: syz_io_uring_setup(0x5c0e, &(0x7f0000000ac0), 0x0, 0x0) [ 2277.189380][ T4299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2277.240923][ T4299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:18:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xffffff8c, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2277.354177][ T4299] team0: Port device team_slave_0 added [ 2277.394315][ T4299] team0: Port device team_slave_1 added 10:18:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x8cffffff, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2277.602531][ T4299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2277.616605][ T1362] Bluetooth: hci10: command 0x0409 tx timeout [ 2277.655976][ T4299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2277.683536][ T4299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2277.730676][ T4299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2277.768591][ T4299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2277.815822][ T4299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2277.894422][ T4299] hsr_slave_0: entered promiscuous mode [ 2277.903742][ T4299] hsr_slave_1: entered promiscuous mode [ 2277.912443][ T4299] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2277.920188][ T4299] Cannot create hsr debugfs directory 10:18:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xfffffff6, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2278.270156][ T4299] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2278.583003][ T4299] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:18:05 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x8000000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2278.940396][ T4299] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2279.139076][ T4299] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:18:05 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2279.425185][ T4344] loop4: detected capacity change from 0 to 2048 [ 2279.604796][ T4344] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) 10:18:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x500000000000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2279.706095][ T1362] Bluetooth: hci10: command 0x041b tx timeout [ 2279.727799][ T4299] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2279.787535][ T4299] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2279.818340][ T4299] netdevsim netdevsim1 netdevsim2: renamed from eth2 10:18:06 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2279.859277][ T4299] netdevsim netdevsim1 netdevsim3: renamed from eth3 10:18:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2280.145840][ T4299] 8021q: adding VLAN 0 to HW filter on device bond0 10:18:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2000000000000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:06 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2280.213535][ T4299] 8021q: adding VLAN 0 to HW filter on device team0 10:18:06 executing program 4: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000180)='./bus\x00', 0x40, &(0x7f0000003240)=ANY=[@ANYBLOB="000d4bb7241e1cda0e94577ab5fc264780b84b20b4697605000013461b86059bc710e91cc1a568fb4ed046dd48766e8ff7fdf3601e091131a90000c78e6beebfb050245163087434601fe8de86a0f3090000005d6c71340300000000000000e67f1f250f6178dd18ea15f143347921000000f8114a18c1be4ab7819c7fb8070de45db2b45778b89adc06007570f18062faa7be54c53d581ccaa017edbf0cd8096f6ab338a73a189005da74b6ddfb72386f3917df2a85fd400ab69b9710863a09e8d1bac64e95cb38fa4e7f2318fce7dddc10cade22925399d1ec79cbfbf0dd28f21ea5d8b76dd3ca178bd6327e873abaffbe19dc7f4aac111f3af86f2e9f3fa6b25309d7d71898e145ea00a79de79149137f835d382e829b3a77feb8ab4c17043f90f1e70263438d26a4aa8e796f00be0fa22205024ecfdc8579fd820f7c077517ca1349c6950d4898915d173f5c6306b20d2e964a0287c16d1b976ff95388d2c7cb345c1e122099c22884585d101cdfbf438da8f5838d7c3208de07324663c567b188f3e5aa41eb46154412580a7e69aee7d3d24a98b8b272963b8f82dd86e3c80701623dd2f1b25cafa1a7eefdbe8644a682e31c2a47532e5a67eb0ff8f5813b5ddde508fa7c75c4b25365e59d9addc7b55d3f35f4b7c0779cf3c1788daf5d166166981ff412144d1090b7526b9bd819bb36d2c4972333a99226e673b448d79cb13abb80000000002ac6019b431ab941f2710bd9a96a11d8a938efc3ce28c752be9bd6e373dc1a34db007ebe5ab5c47e75a39b25201f1abce126ff3d39c9abfbbfff6a8a703c557cb4dafb84030000006b3b9b9623c6e534a6b45e83e644faab686cf25b9f65650cc372d5f625e1bb9306d37462191e4f5585871ecace2fba0d983465b8c786f8f18e2b51a53eb6b398b11196a772a57e43b1725128b79049c6b824a42434e5de6e072d59426185574d6fc02ba0bd062bc8d6152dd7fbf30aa434d8172956e21294267e1ceba01b268c46662c2ac5b9c6d9da95fdad9e44c74dfdcc2f3b332467e118e46aa903da20638d7f9c02c2a809e2d6254026c3d28336002a16bb90a35436f2b948c43107fb54f95b2b454938ab2e58806ded25bc0b70e594675904eb72aa3585200af5609f5f4f303b5c4689fa85bda405b24a216bd4bfe40728b381bc71eb082004162f7c2bb665f4ee7eec18a1ab01de7098f689b2e5f1b0dd40831352fa78eecf79ab4035c505e80119b09eb51815b04fc1cb76a118f34912fc76d7590a3690facd8fc103e3d6e892dff14a76c3bc6a7a64d625e8f284579738f00c4fbcd6f9a53972bfe2df18dd0fc8bc8c55c805a5097f9a2cb1ae516df38b7087f325bf82d191f10f00881a70cba51cc7e65f25acc3fa75a8b0245fd4c18c5645ffffffff385c890f95a273d970ece65c1f36a023d1914ec36cb5763047b87e727e5d4b6c35603deb607d0867981a74e4b9960d26e8f9c54636645cede4d52f75278513d0080947fa58a4203e27dc970000000000000000000000843e90743c739fa7b4d70c41e7cd66e24ca305db2b44cf02052333beb664ea7435d12de9671b823eea47389bfbaa3a696089af9ba0ad1eef0a0890fa1ca14e8b7c0b31535eaaf28a0e601c870ee893f8116ac79908b554f754064e0912e7f128750e26f0ac164884083fe2108813660879b3fc3b78baabf157402485ff07f9cb481e2a3e83041d4a48fd94a8277e337b4737678b20e2bb15b8fa5d174d347d6d0fd15a2ee82e12eb5cf4732babe4f3c488c21da59a70e51250eeca18d8edd0155bc63b"], 0x1, 0xbee, &(0x7f0000000cc0)="$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") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) [ 2280.264644][T14911] bridge0: port 1(bridge_slave_0) entered blocking state [ 2280.271913][T14911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2280.291618][T14911] bridge0: port 2(bridge_slave_1) entered blocking state [ 2280.298862][T14911] bridge0: port 2(bridge_slave_1) entered forwarding state 10:18:07 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2010000000000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2281.028827][ T4299] 8021q: adding VLAN 0 to HW filter on device batadv0 10:18:07 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2281.214237][ T4299] veth0_vlan: entered promiscuous mode [ 2281.289690][ T4299] veth1_vlan: entered promiscuous mode 10:18:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x8cffffff00000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2281.393785][ T4299] veth0_macvtap: entered promiscuous mode [ 2281.427689][ T4299] veth1_macvtap: entered promiscuous mode [ 2281.478751][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2281.501856][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.512046][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2281.536175][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.559178][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 10:18:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2281.582588][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.592859][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2281.618993][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.645947][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2281.671465][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.696799][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2281.732762][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.756010][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2281.780341][ T1362] Bluetooth: hci10: command 0x040f tx timeout [ 2281.788195][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.826245][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 10:18:08 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2281.875903][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.885788][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2281.958338][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2281.995981][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2282.012511][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.023019][ T4372] loop4: detected capacity change from 0 to 2048 [ 2282.046670][ T4299] batman_adv: batadv0: Interface activated: batadv_slave_0 10:18:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xf6ffffff00000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2282.124779][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.147687][ T4372] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 2282.154150][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.171234][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.183000][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.193074][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.228691][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.295930][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.346810][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.400440][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.421594][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.446585][ T4379] fuse: Bad value for 'fd' [ 2282.456162][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 10:18:08 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2282.497428][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.538514][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.576041][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.591739][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.608269][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.621870][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2282.638835][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.657694][ T4299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 10:18:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xf9fdffff00000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2282.686519][ T4299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2282.708458][ T4299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2282.748452][ T4299] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2282.772036][ T4299] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2282.790533][ T4299] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2282.806175][ T4299] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 10:18:09 executing program 4: syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000180)='./bus\x00', 0x40, &(0x7f0000003240)=ANY=[@ANYBLOB="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"], 0x1, 0xbee, &(0x7f0000000cc0)="$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") r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) [ 2283.066140][T10959] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2283.077012][T10959] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 10:18:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2283.160854][ T4385] fuse: Bad value for 'fd' [ 2283.201176][T10959] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2283.212583][T10959] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 10:18:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="290000000300000000e60000000000000100000000000000080000000000000067726f75705f696400"], 0x29) 10:18:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0xffffffff00000000, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2283.685269][ T4393] fuse: Bad value for 'fd' [ 2283.701185][ T1241] ieee802154 phy0 wpan0: encryption failed: -22 [ 2283.708795][ T1241] ieee802154 phy1 wpan1: encryption failed: -22 [ 2283.856772][ T1362] Bluetooth: hci10: command 0x0419 tx timeout [ 2283.888843][ T4395] fuse: Invalid rootmode 10:18:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x8, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2284.180697][ T4400] fuse: Invalid rootmode 10:18:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="290000000300000000e60000000000000100000000000000080000000000000067726f75705f696400"], 0x29) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) (async) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="290000000300000000e60000000000000100000000000000080000000000000067726f75705f696400"], 0x29) (async) [ 2284.383045][ T4404] fuse: Invalid rootmode 10:18:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2284.439338][ T4405] fuse: Unknown parameter 'fd0x0000000000000003' 10:18:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x8, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2284.581833][ T4401] loop4: detected capacity change from 0 to 2048 [ 2284.639069][ T4407] fuse: Invalid rootmode 10:18:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2284.749696][ T4401] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2022/11/22 14:59 (1000) [ 2284.862889][ T4411] fuse: Bad value for 'fd' 10:18:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0xfffffdf9, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4005}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2284.967492][ T4416] fuse: Unknown parameter 'rootmode00000000000000000040000' [ 2285.096447][ T4418] fuse: Invalid rootmode 10:18:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x8, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x20100000, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2285.759477][ T4428] fuse: Unknown parameter 'rootmode00000000000000000040000' [ 2286.183462][ T4430] fuse: Bad value for 'source' 10:18:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xffff8000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:18:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x8}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x5, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x8}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2287.378044][ T4446] fuse: Unknown parameter 'user_id00000000000000000000' 10:18:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2287.745802][ T4455] fuse: Unknown parameter 'group_id00000000000000000000' 10:18:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x5, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 10:18:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [], 0x5}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2289.699380][ T4477] fuse: Unknown parameter '' 10:18:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8a000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize}, {@allow_other}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x1a73}}], [{@appraise}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_type}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@appraise}, {@dont_appraise}]}}) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x120) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 10:18:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x4, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8a000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize}, {@allow_other}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x1a73}}], [{@appraise}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_type}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@appraise}, {@dont_appraise}]}}) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x120) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:18:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x8a000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize}, {@allow_other}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x1a73}}], [{@appraise}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_type}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@appraise}, {@dont_appraise}]}}) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x120) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2301.157361][ T4513] Bluetooth: hci3: command 0x0406 tx timeout [ 2301.157910][T21762] Bluetooth: hci0: command 0x0406 tx timeout 10:18:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async, rerun: 32) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="290000000300000000e60000000000000100000000000000080000000000000067726f75705f696400"], 0x29) 10:18:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r5}, 0x50) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 10:18:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (fail_nth: 1) 10:18:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) [ 2314.758124][ T4522] FAULT_INJECTION: forcing a failure. [ 2314.758124][ T4522] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.794506][ T4522] CPU: 0 PID: 4522 Comm: syz-executor.3 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2314.804922][ T4522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2314.815027][ T4522] Call Trace: [ 2314.818354][ T4522] [ 2314.821330][ T4522] dump_stack_lvl+0x1e7/0x2e0 [ 2314.826073][ T4522] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2314.831334][ T4522] ? __pfx__printk+0x10/0x10 [ 2314.835995][ T4522] should_fail_ex+0x3ae/0x4e0 [ 2314.840744][ T4522] ? getname_flags+0xbc/0x4f0 [ 2314.845523][ T4522] should_failslab+0x9/0x20 [ 2314.850093][ T4522] kmem_cache_alloc+0x77/0x340 [ 2314.854924][ T4522] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2314.861000][ T4522] getname_flags+0xbc/0x4f0 [ 2314.865580][ T4522] __x64_sys_mkdirat+0x7c/0xa0 [ 2314.870412][ T4522] do_syscall_64+0xf9/0x240 [ 2314.874984][ T4522] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2314.880946][ T4522] RIP: 0033:0x7f5e1627dda9 [ 2314.885414][ T4522] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2314.905070][ T4522] RSP: 002b:00007f5e16f9b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2314.913548][ T4522] RAX: ffffffffffffffda RBX: 00007f5e163abf80 RCX: 00007f5e1627dda9 [ 2314.921574][ T4522] RDX: 0000000000000000 RSI: 0000000020004380 RDI: ffffffffffffff9c [ 2314.929600][ T4522] RBP: 00007f5e16f9b120 R08: 0000000000000000 R09: 0000000000000000 [ 2314.937632][ T4522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2314.945662][ T4522] R13: 000000000000000b R14: 00007f5e163abf80 R15: 00007ffe49c61bd8 [ 2314.953729][ T4522] 10:18:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (fail_nth: 2) [ 2315.507851][ T4532] FAULT_INJECTION: forcing a failure. [ 2315.507851][ T4532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2315.536017][ T4532] CPU: 1 PID: 4532 Comm: syz-executor.3 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2315.546426][ T4532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2315.556497][ T4532] Call Trace: [ 2315.559789][ T4532] [ 2315.562733][ T4532] dump_stack_lvl+0x1e7/0x2e0 [ 2315.567441][ T4532] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2315.572663][ T4532] ? __pfx__printk+0x10/0x10 [ 2315.577271][ T4532] ? __pfx_lock_release+0x10/0x10 [ 2315.582322][ T4532] should_fail_ex+0x3ae/0x4e0 [ 2315.587027][ T4532] strncpy_from_user+0x36/0x2f0 [ 2315.591898][ T4532] getname_flags+0xf9/0x4f0 [ 2315.596428][ T4532] __x64_sys_mkdirat+0x7c/0xa0 [ 2315.601236][ T4532] do_syscall_64+0xf9/0x240 [ 2315.605786][ T4532] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2315.611722][ T4532] RIP: 0033:0x7f5e1627dda9 [ 2315.616180][ T4532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2315.635824][ T4532] RSP: 002b:00007f5e16f9b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2315.644280][ T4532] RAX: ffffffffffffffda RBX: 00007f5e163abf80 RCX: 00007f5e1627dda9 [ 2315.652274][ T4532] RDX: 0000000000000000 RSI: 0000000020004380 RDI: ffffffffffffff9c [ 2315.660258][ T4532] RBP: 00007f5e16f9b120 R08: 0000000000000000 R09: 0000000000000000 [ 2315.668239][ T4532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2315.676220][ T4532] R13: 000000000000000b R14: 00007f5e163abf80 R15: 00007ffe49c61bd8 [ 2315.684219][ T4532] 10:18:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30}, 0x30) 10:18:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (fail_nth: 3) [ 2316.309231][ T4539] FAULT_INJECTION: forcing a failure. [ 2316.309231][ T4539] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.336457][ T4539] CPU: 0 PID: 4539 Comm: syz-executor.3 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2316.346877][ T4539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2316.356978][ T4539] Call Trace: [ 2316.360294][ T4539] [ 2316.363276][ T4539] dump_stack_lvl+0x1e7/0x2e0 [ 2316.368010][ T4539] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2316.373234][ T4539] ? __pfx__printk+0x10/0x10 [ 2316.377858][ T4539] ? __pfx___might_resched+0x10/0x10 [ 2316.383156][ T4539] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2316.389167][ T4539] should_fail_ex+0x3ae/0x4e0 [ 2316.393866][ T4539] ? __d_alloc+0x31/0x700 [ 2316.398210][ T4539] should_failslab+0x9/0x20 [ 2316.402738][ T4539] kmem_cache_alloc_lru+0x7a/0x350 [ 2316.407877][ T4539] __d_alloc+0x31/0x700 [ 2316.412046][ T4539] ? __down_write_common+0x161/0x200 [ 2316.417358][ T4539] d_alloc+0x4b/0x190 [ 2316.421360][ T4539] lookup_one_qstr_excl+0xce/0x260 [ 2316.426501][ T4539] filename_create+0x297/0x540 [ 2316.431297][ T4539] ? __pfx_filename_create+0x10/0x10 [ 2316.436615][ T4539] do_mkdirat+0xbd/0x3a0 [ 2316.440890][ T4539] ? __pfx_do_mkdirat+0x10/0x10 [ 2316.445758][ T4539] ? getname_flags+0x1fd/0x4f0 [ 2316.450548][ T4539] __x64_sys_mkdirat+0x89/0xa0 [ 2316.455330][ T4539] do_syscall_64+0xf9/0x240 [ 2316.459862][ T4539] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2316.465776][ T4539] RIP: 0033:0x7f5e1627dda9 [ 2316.470205][ T4539] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2316.489825][ T4539] RSP: 002b:00007f5e16f9b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2316.498521][ T4539] RAX: ffffffffffffffda RBX: 00007f5e163abf80 RCX: 00007f5e1627dda9 [ 2316.506509][ T4539] RDX: 0000000000000000 RSI: 0000000020004380 RDI: ffffffffffffff9c [ 2316.514495][ T4539] RBP: 00007f5e16f9b120 R08: 0000000000000000 R09: 0000000000000000 [ 2316.522479][ T4539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2316.530463][ T4539] R13: 000000000000000b R14: 00007f5e163abf80 R15: 00007ffe49c61bd8 [ 2316.538481][ T4539] 10:18:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (fail_nth: 4) 10:18:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30}, 0x30) [ 2317.091013][ T4542] FAULT_INJECTION: forcing a failure. [ 2317.091013][ T4542] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.136253][ T4542] CPU: 0 PID: 4542 Comm: syz-executor.3 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2317.146755][ T4542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2317.156864][ T4542] Call Trace: [ 2317.160189][ T4542] [ 2317.163167][ T4542] dump_stack_lvl+0x1e7/0x2e0 [ 2317.167924][ T4542] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2317.173193][ T4542] ? __pfx__printk+0x10/0x10 [ 2317.177851][ T4542] ? __pfx___might_resched+0x10/0x10 [ 2317.183199][ T4542] should_fail_ex+0x3ae/0x4e0 [ 2317.187943][ T4542] ? fuse_lookup_name+0x152/0x830 [ 2317.193030][ T4542] should_failslab+0x9/0x20 [ 2317.197592][ T4542] kmalloc_trace+0x76/0x360 [ 2317.202171][ T4542] fuse_lookup_name+0x152/0x830 [ 2317.207099][ T4542] ? __pfx_fuse_lookup_name+0x10/0x10 [ 2317.212540][ T4542] ? fuse_lock_inode+0xd3/0x120 [ 2317.217487][ T4542] fuse_lookup+0x182/0x600 [ 2317.221970][ T4542] ? __pfx_fuse_lookup+0x10/0x10 [ 2317.226965][ T4542] ? do_raw_spin_lock+0x14e/0x370 [ 2317.232073][ T4542] ? _raw_spin_unlock+0x28/0x50 [ 2317.236983][ T4542] ? d_alloc+0x142/0x190 [ 2317.241280][ T4542] lookup_one_qstr_excl+0x11f/0x260 [ 2317.246548][ T4542] filename_create+0x297/0x540 [ 2317.251375][ T4542] ? __pfx_filename_create+0x10/0x10 [ 2317.256737][ T4542] do_mkdirat+0xbd/0x3a0 [ 2317.261052][ T4542] ? __pfx_do_mkdirat+0x10/0x10 [ 2317.265958][ T4542] ? getname_flags+0x1fd/0x4f0 [ 2317.270789][ T4542] __x64_sys_mkdirat+0x89/0xa0 [ 2317.275606][ T4542] do_syscall_64+0xf9/0x240 [ 2317.280169][ T4542] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2317.286130][ T4542] RIP: 0033:0x7f5e1627dda9 [ 2317.290588][ T4542] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2317.310245][ T4542] RSP: 002b:00007f5e16f9b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2317.318723][ T4542] RAX: ffffffffffffffda RBX: 00007f5e163abf80 RCX: 00007f5e1627dda9 [ 2317.326747][ T4542] RDX: 0000000000000000 RSI: 0000000020004380 RDI: ffffffffffffff9c [ 2317.334771][ T4542] RBP: 00007f5e16f9b120 R08: 0000000000000000 R09: 0000000000000000 [ 2317.342794][ T4542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2317.350809][ T4542] R13: 000000000000000b R14: 00007f5e163abf80 R15: 00007ffe49c61bd8 [ 2317.358935][ T4542] 10:18:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (fail_nth: 5) [ 2317.578147][T21762] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 2317.595204][T21762] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 2317.613143][T21762] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 2317.622782][T21762] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 2317.631571][T21762] Bluetooth: hci11: unexpected cc 0x0c25 length: 249 > 3 [ 2317.642271][T21762] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 10:18:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00}}, './file0/file0\x00'}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30}, 0x30) [ 2318.495299][ T4547] chnl_net:caif_netlink_parms(): no params data found 10:18:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2318.764013][ T4547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2318.775126][ T4547] bridge0: port 1(bridge_slave_0) entered disabled state [ 2318.785977][ T4547] bridge_slave_0: entered allmulticast mode [ 2318.799620][ T4547] bridge_slave_0: entered promiscuous mode [ 2318.812767][ T4547] bridge0: port 2(bridge_slave_1) entered blocking state [ 2318.826011][ T4547] bridge0: port 2(bridge_slave_1) entered disabled state [ 2318.839594][ T4547] bridge_slave_1: entered allmulticast mode [ 2318.851869][ T4547] bridge_slave_1: entered promiscuous mode [ 2318.973395][ T4547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2319.031181][ T4547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2319.144141][ T4547] team0: Port device team_slave_0 added [ 2319.185318][ T4547] team0: Port device team_slave_1 added [ 2319.291185][ T4547] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2319.312650][ T4547] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2319.365932][ T4547] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2319.421126][ T4547] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2319.443311][ T4547] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2319.520231][ T4547] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 10:18:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2319.667592][ T4547] hsr_slave_0: entered promiscuous mode [ 2319.687502][ T4547] hsr_slave_1: entered promiscuous mode [ 2319.696490][T21762] Bluetooth: hci11: command 0x0409 tx timeout [ 2319.707062][ T4547] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2319.716922][ T4547] Cannot create hsr debugfs directory 10:18:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0xebffffff) 10:18:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r2, &(0x7f0000001c80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, r3, {0x7, 0x27, 0x3, 0x0, 0x0, 0x401, 0x709, 0x4}}, 0x50) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0/file0\x00'}) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r3, {0x8, 0x3, 0x0, {0x3, 0x3f, 0x2, 0x8, 0x800, 0x4, 0x0, 0x6, 0xfffffff8, 0xa000, 0x3, 0xee00, r4, 0x8000}}}, 0x78) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) (fail_nth: 1) [ 2320.461110][ T4547] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:18:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) read$FUSE(r1, &(0x7f0000001c80)={0x2020}, 0x2020) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2320.667912][ T4547] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2320.848326][ T4547] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2320.969964][ T4547] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2320.989220][ T4580] FAULT_INJECTION: forcing a failure. [ 2320.989220][ T4580] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.013724][ T4580] CPU: 1 PID: 4580 Comm: syz-executor.0 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2321.024140][ T4580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2321.034336][ T4580] Call Trace: [ 2321.037656][ T4580] [ 2321.040631][ T4580] dump_stack_lvl+0x1e7/0x2e0 [ 2321.045375][ T4580] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2321.050638][ T4580] ? __pfx__printk+0x10/0x10 [ 2321.055291][ T4580] ? __pfx_fuse_inode_eq+0x10/0x10 [ 2321.060496][ T4580] should_fail_ex+0x3ae/0x4e0 [ 2321.065243][ T4580] ? fuse_dev_do_write+0x3836/0x54f0 [ 2321.070596][ T4580] should_failslab+0x9/0x20 [ 2321.075151][ T4580] __kmalloc+0xe6/0x490 [ 2321.079380][ T4580] fuse_dev_do_write+0x3836/0x54f0 [ 2321.084597][ T4580] ? __pfx_validate_chain+0x10/0x10 [ 2321.089860][ T4580] ? __pfx_fuse_dev_do_write+0x10/0x10 [ 2321.095416][ T4580] ? __pfx_lock_acquire+0x10/0x10 [ 2321.100520][ T4580] ? get_pid_task+0x23/0x1f0 [ 2321.105181][ T4580] ? mark_lock+0x9a/0x350 [ 2321.109579][ T4580] fuse_dev_write+0x149/0x1d0 [ 2321.114312][ T4580] ? __pfx_fuse_dev_write+0x10/0x10 [ 2321.119564][ T4580] ? bpf_lsm_file_permission+0x9/0x10 [ 2321.124968][ T4580] ? security_file_permission+0x7f/0xa0 [ 2321.130543][ T4580] vfs_write+0xa81/0xcb0 [ 2321.134801][ T4580] ? __pfx_lock_release+0x10/0x10 [ 2321.139856][ T4580] ? __pfx_vfs_write+0x10/0x10 [ 2321.144639][ T4580] ? __fget_files+0x3f4/0x470 [ 2321.149348][ T4580] ? __fdget_pos+0x1a1/0x320 [ 2321.154044][ T4580] ksys_write+0x1a0/0x2c0 [ 2321.158401][ T4580] ? __pfx_ksys_write+0x10/0x10 [ 2321.163266][ T4580] ? do_syscall_64+0x108/0x240 [ 2321.168055][ T4580] ? do_syscall_64+0xb4/0x240 [ 2321.172757][ T4580] do_syscall_64+0xf9/0x240 [ 2321.177288][ T4580] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2321.183211][ T4580] RIP: 0033:0x7fcc3367dda9 [ 2321.187643][ T4580] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2321.207273][ T4580] RSP: 002b:00007fcc329de0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2321.215706][ T4580] RAX: ffffffffffffffda RBX: 00007fcc337ac050 RCX: 00007fcc3367dda9 [ 2321.223695][ T4580] RDX: 0000000000000030 RSI: 0000000020000000 RDI: 0000000000000003 [ 2321.231691][ T4580] RBP: 00007fcc329de120 R08: 0000000000000000 R09: 0000000000000000 [ 2321.239675][ T4580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2321.247706][ T4580] R13: 000000000000006e R14: 00007fcc337ac050 R15: 00007fffc8358898 [ 2321.255708][ T4580] 10:18:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0xffffffeb) [ 2321.683964][ T4547] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2321.706924][ T4547] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2321.724339][ T4547] netdevsim netdevsim1 netdevsim2: renamed from eth2 10:18:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) (fail_nth: 2) [ 2321.738412][ T4547] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2321.777054][T21762] Bluetooth: hci11: command 0x041b tx timeout 10:18:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2322.074245][ T4547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2322.150012][ T4547] 8021q: adding VLAN 0 to HW filter on device team0 [ 2322.191488][ T2979] bridge0: port 1(bridge_slave_0) entered blocking state [ 2322.198733][ T2979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2322.246740][ T2979] bridge0: port 2(bridge_slave_1) entered blocking state [ 2322.253947][ T2979] bridge0: port 2(bridge_slave_1) entered forwarding state 10:18:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0xebffffff00000000) 10:18:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x141842, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2322.726772][ T4547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2322.881368][ T4547] veth0_vlan: entered promiscuous mode [ 2322.930214][ T4547] veth1_vlan: entered promiscuous mode [ 2323.035062][ T4547] veth0_macvtap: entered promiscuous mode [ 2323.062780][ T4587] FAULT_INJECTION: forcing a failure. [ 2323.062780][ T4587] name fail_futex, interval 1, probability 0, space 0, times 1 [ 2323.067140][ T4547] veth1_macvtap: entered promiscuous mode [ 2323.091984][ T4587] CPU: 1 PID: 4587 Comm: syz-executor.0 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2323.102384][ T4587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2323.112485][ T4587] Call Trace: [ 2323.115804][ T4587] [ 2323.118776][ T4587] dump_stack_lvl+0x1e7/0x2e0 [ 2323.122571][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.123500][ T4587] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2323.134019][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.139161][ T4587] ? __pfx__printk+0x10/0x10 [ 2323.139198][ T4587] ? register_lock_class+0x102/0x980 [ 2323.158962][ T4587] ? __pfx_validate_chain+0x10/0x10 [ 2323.164200][ T4587] ? __pfx_register_lock_class+0x10/0x10 [ 2323.166292][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.169857][ T4587] ? __pfx_validate_chain+0x10/0x10 [ 2323.185506][ T4587] should_fail_ex+0x3ae/0x4e0 [ 2323.190234][ T4587] get_futex_key+0x17b/0x1050 [ 2323.191937][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.194944][ T4587] ? __pfx_get_futex_key+0x10/0x10 [ 2323.209886][ T4587] ? __lock_acquire+0x1345/0x1fd0 [ 2323.214963][ T4587] futex_wake+0x12a/0x5c0 [ 2323.219336][ T4587] ? __pfx_futex_wake+0x10/0x10 [ 2323.224243][ T4587] do_futex+0x392/0x560 [ 2323.225883][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.228422][ T4587] ? __pfx_do_futex+0x10/0x10 [ 2323.243532][ T4587] ? __might_fault+0xa9/0x120 [ 2323.247421][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.248238][ T4587] mm_release+0x193/0x430 [ 2323.262398][ T4587] ? exit_robust_list+0x2cf/0x2f0 [ 2323.266567][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.267445][ T4587] ? __pfx_mm_release+0x10/0x10 [ 2323.282741][ T4587] ? _raw_spin_unlock_irq+0x23/0x50 [ 2323.287977][ T4587] ? lockdep_hardirqs_on+0x98/0x140 [ 2323.293234][ T4587] exit_mm+0xaf/0x310 [ 2323.293632][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.297236][ T4587] ? __pfx_exit_mm+0x10/0x10 [ 2323.297266][ T4587] ? taskstats_exit+0x439/0xa00 [ 2323.297300][ T4587] ? lockdep_hardirqs_on+0x98/0x140 [ 2323.297330][ T4587] do_exit+0x9af/0x2740 [ 2323.297367][ T4587] ? __pfx_do_exit+0x10/0x10 [ 2323.297397][ T4587] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 2323.297437][ T4587] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 2323.297468][ T4587] ? _raw_spin_lock_irq+0xdf/0x120 [ 2323.297501][ T4587] do_group_exit+0x206/0x2c0 [ 2323.297527][ T4587] ? _raw_spin_unlock_irq+0x23/0x50 [ 2323.297552][ T4587] ? lockdep_hardirqs_on+0x98/0x140 [ 2323.297589][ T4587] get_signal+0x176d/0x1850 [ 2323.297638][ T4587] ? __pfx_get_signal+0x10/0x10 [ 2323.297669][ T4587] ? __pfx_task_work_add+0x10/0x10 [ 2323.297703][ T4587] arch_do_signal_or_restart+0x96/0x860 [ 2323.297738][ T4587] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 2323.297765][ T4587] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2323.297810][ T4587] ? syscall_exit_to_user_mode+0xa2/0x370 [ 2323.297843][ T4587] syscall_exit_to_user_mode+0xc8/0x370 [ 2323.297898][ T4587] do_syscall_64+0x108/0x240 [ 2323.297934][ T4587] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2323.297965][ T4587] RIP: 0033:0x7fcc3367dda9 [ 2323.297987][ T4587] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 2323.298006][ T4587] RSP: 002b:00007fcc329de0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2323.298032][ T4587] RAX: fffffffffffffffc RBX: 00007fcc337ac050 RCX: 00007fcc3367dda9 [ 2323.298050][ T4587] RDX: 0000000000000030 RSI: 0000000020000000 RDI: 0000000000000003 [ 2323.298064][ T4587] RBP: 00007fcc329de120 R08: 0000000000000000 R09: 0000000000000000 [ 2323.298079][ T4587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 10:18:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2323.298094][ T4587] R13: 000000000000006e R14: 00007fcc337ac050 R15: 00007fffc8358898 [ 2323.298127][ T4587] [ 2323.533355][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.568399][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.598880][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.636085][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.656029][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.676558][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.723942][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.761013][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.779316][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.807394][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.848395][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.856306][T21762] Bluetooth: hci11: command 0x040f tx timeout [ 2323.872012][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.891527][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2323.912674][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2323.939761][ T4547] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2324.008642][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.046007][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.068268][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.099837][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.130006][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.165994][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.190781][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.214260][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.239737][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.262352][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.285206][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.311140][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.337002][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.360056][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:18:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2324.382831][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.401167][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.422902][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.434347][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.444889][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.456032][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.466509][ T4547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2324.480151][ T4547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2324.500108][ T4547] batman_adv: batadv0: Interface activated: batadv_slave_1 10:18:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0xffffffff00000000) [ 2324.592376][ T4547] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2324.625569][ T4547] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2324.637217][ T4547] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2324.661119][ T4547] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2324.920352][T22053] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2324.942170][T22053] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 10:18:51 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x10, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2325.030146][ T2812] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2325.048349][ T2812] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 10:18:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async, rerun: 32) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="290000000300000000e60000000000000100000000000000080000000000000067726f75705f696400"], 0x29) 10:18:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:18:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c987b65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2325.936796][T21762] Bluetooth: hci11: command 0x0419 tx timeout [ 2326.188079][ T4619] fuse: Unknown parameter '{er_id' 10:19:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async, rerun: 64) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 10:19:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:19:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c987b65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:19:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x2, 0x0, {0x0, 0x1}}, 0x30) 10:19:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:19:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async, rerun: 32) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) (rerun: 32) [ 2344.878113][ T4631] fuse: Unknown parameter '{er_id' 10:19:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c987b65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c987b65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:19:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2345.154667][ T1241] ieee802154 phy0 wpan0: encryption failed: -22 [ 2345.161310][ T1241] ieee802154 phy1 wpan1: encryption failed: -22 10:19:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c7063723d30303030303030303030303030303030303030392c66586e616d653d757365725f69642c6f626a5f74797065b6b2d9fa88d015265021e3af142c61756469742c646f6e745f6d6561737572652c00"]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x84000, &(0x7f00000001c0)=ANY=[@ANYBLOB='lowerdir=./file0/file0,nfs_export=off,workdir=./file0,lowerdir=./file0/file1,mask=^MAY_WRITE,seclabel,uid<', @ANYRESDEC=r2, @ANYBLOB=',m`bd,\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2345.584193][ T4640] fuse: Unknown parameter '{er_id' [ 2345.605884][ T4641] fuse: Unknown parameter '{er_id' 10:19:12 executing program 3: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="660118b38fc0daca729cfd99c81c99e2c8ae621a4489d3", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:19:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x2}}, 0x30) 10:19:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2346.123700][ T4645] fuse: Unknown parameter 'pcr' 10:19:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c7063723d30303030303030303030303030303030303030392c66586e616d653d757365725f69642c6f626a5f74797065b6b2d9fa88d015265021e3af142c61756469742c646f6e745f6d6561737572652c00"]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async, rerun: 32) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x84000, &(0x7f00000001c0)=ANY=[@ANYBLOB='lowerdir=./file0/file0,nfs_export=off,workdir=./file0,lowerdir=./file0/file1,mask=^MAY_WRITE,seclabel,uid<', @ANYRESDEC=r2, @ANYBLOB=',m`bd,\x00']) (async, rerun: 64) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) (rerun: 64) [ 2346.263286][ T4649] fuse: Unknown parameter 'frȮbD0x0000000000000003' 10:19:12 executing program 3: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x8) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async, rerun: 64) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="660118b38fc0daca729cfd99c81c99e2c8ae621a4489d3", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2346.550162][ T4654] fuse: Unknown parameter 'pcr' 10:19:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c7063723d30303030303030303030303030303030303030392c66586e616d653d757365725f69642c6f626a5f74797065b6b2d9fa88d015265021e3af142c61756469742c646f6e745f6d6561737572652c00"]) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x84000, &(0x7f00000001c0)=ANY=[@ANYBLOB='lowerdir=./file0/file0,nfs_export=off,workdir=./file0,lowerdir=./file0/file1,mask=^MAY_WRITE,seclabel,uid<', @ANYRESDEC=r2, @ANYBLOB=',m`bd,\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2346.683362][ T4656] fuse: Unknown parameter 'frȮbD0xffffffffffffffff' [ 2346.733466][ T4658] fuse: Bad value for 'fd' 10:19:13 executing program 3: read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x8) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="660118b38fc0daca729cfd99c81c99e2c8ae621a4489d3", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (rerun: 32) 10:19:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:19:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x10) 10:19:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@subj_type={'subj_type', 0x3d, 'fd'}}, {@fowner_lt}]}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="2900ec0003004eb200000000000000000000595a2ad6f291b1fbf401007fc608000000f43b0da965d5"], 0x29) [ 2347.249173][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.277839][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.315676][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.338315][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.365081][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.383269][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.403913][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.422850][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.453771][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.476444][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.509003][ T1362] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1 [ 2347.518161][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.538510][ T1362] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9 [ 2347.548885][ T1362] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9 [ 2347.551883][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.569350][ T1362] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4 10:19:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2347.584733][ T1362] Bluetooth: hci12: unexpected cc 0x0c25 length: 249 > 3 [ 2347.592459][ T1362] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2 [ 2347.617084][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' 10:19:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@subj_type={'subj_type', 0x3d, 'fd'}}, {@fowner_lt}]}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="2900ec0003004eb200000000000000000000595a2ad6f291b1fbf401007fc608000000f43b0da965d5"], 0x29) [ 2347.716077][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.756533][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.799052][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.826311][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.846387][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.867195][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.892099][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.914344][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.936429][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.947538][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.966657][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2347.986415][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2348.006530][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2348.022413][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' [ 2348.055676][ T4667] fuse: Unknown parameter 'frȮbD0x0000000000000003' 10:19:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66ca93010117e286393e1e9093b05d643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) 10:19:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000000)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_hash}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@subj_type={'subj_type', 0x3d, 'fd'}}, {@fowner_lt}]}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) (async) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)=ANY=[@ANYBLOB="2900ec0003004eb200000000000000000000595a2ad6f291b1fbf401007fc608000000f43b0da965d5"], 0x29) [ 2348.379646][ T4672] chnl_net:caif_netlink_parms(): no params data found 10:19:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100, 0x10, &(0x7f0000000100)) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x80, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2348.704348][ T4690] fuse: Bad value for 'fd' [ 2348.723744][ T4693] fuse: Unknown parameter 'fʓ9>]d' 10:19:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2348.764800][ T4672] bridge0: port 1(bridge_slave_0) entered blocking state [ 2348.779530][ T4672] bridge0: port 1(bridge_slave_0) entered disabled state 10:19:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66ca93010117e286393e1e9093b05d643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2348.826194][ T4672] bridge_slave_0: entered allmulticast mode [ 2348.833884][ T4672] bridge_slave_0: entered promiscuous mode [ 2348.869717][ T4672] bridge0: port 2(bridge_slave_1) entered blocking state [ 2348.888400][ T4672] bridge0: port 2(bridge_slave_1) entered disabled state [ 2348.916247][ T4672] bridge_slave_1: entered allmulticast mode [ 2348.927928][ T4672] bridge_slave_1: entered promiscuous mode 10:19:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0/file0\x00'}) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[], [{@euid_lt={'euid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x7a, 0x0, 0x63, 0x38, 0x37, 0x34, 0x34], 0x2d, [0x63, 0x63, 0x55, 0x3d], 0x2d, [0x63, 0x63, 0x62, 0x6a955aa14b22c2b2], 0x2d, [0x39, 0x61, 0x61, 0x66], 0x2d, [0x32, 0x34, 0x38, 0x62, 0x39, 0x66, 0x30, 0x39]}}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r2}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2349.049094][ T4672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2349.078219][ T4672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2349.230944][ T4672] team0: Port device team_slave_0 added [ 2349.260695][ T4672] team0: Port device team_slave_1 added [ 2349.401182][ T4703] fuse: Unknown parameter 'fʓ9>]d' 10:19:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) (rerun: 32) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66ca93010117e286393e1e9093b05d643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2349.450748][ T4672] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2349.496151][ T4672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2349.550048][ T4672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 10:19:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0/file0\x00'}) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[], [{@euid_lt={'euid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x7a, 0x0, 0x63, 0x38, 0x37, 0x34, 0x34], 0x2d, [0x63, 0x63, 0x55, 0x3d], 0x2d, [0x63, 0x63, 0x62, 0x6a955aa14b22c2b2], 0x2d, [0x39, 0x61, 0x61, 0x66], 0x2d, [0x32, 0x34, 0x38, 0x62, 0x39, 0x66, 0x30, 0x39]}}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r2}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0/file0\x00'}) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[], [{@euid_lt={'euid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x7a, 0x0, 0x63, 0x38, 0x37, 0x34, 0x34], 0x2d, [0x63, 0x63, 0x55, 0x3d], 0x2d, [0x63, 0x63, 0x62, 0x6a955aa14b22c2b2], 0x2d, [0x39, 0x61, 0x61, 0x66], 0x2d, [0x32, 0x34, 0x38, 0x62, 0x39, 0x66, 0x30, 0x39]}}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) (async) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r2}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) (async) [ 2349.601587][ T4672] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2349.613880][ T4706] fuse: Unknown parameter 'euid<00000000000000000000' [ 2349.623692][ T4672] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2349.683737][ T4672] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2349.696941][T21762] Bluetooth: hci12: command 0x0409 tx timeout 10:19:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2349.930290][ T4672] hsr_slave_0: entered promiscuous mode [ 2349.959038][ T4672] hsr_slave_1: entered promiscuous mode [ 2349.979279][ T4672] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2350.000782][ T4672] Cannot create hsr debugfs directory [ 2350.007109][ T4712] fuse: Unknown parameter 'fʓ9>]d' 10:19:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100, 0x10, &(0x7f0000000100)) (async) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x80, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}}, 0x0, 0x0, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:19:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x85, 0x3, 0x0, {0x0, 0x64, 0x0, 'f\x8e\x06\xb9\x98\x10X\x1a\x04Y@Xuse\x00\xc4k>\x05\x81C\xd6\x8fy\xb1[\x17\xc1\xe2u*\xc9Gr\xc7\xcdI\xf6\xd1}K\x1d[]\t\xcf\xdb\r\xd6\\p\xef\x17\xbaO\xbe\x06\xd4.\xf0O\x83\x8b]>\x8aT\x14\x15\x9f\x01\xef[%\xe4\x1c\xc8\xb7\xffj\xea\xcb\x8a\xfd\x054E\xfe\xe3\x16A\xc1\xab\x8f9\x9f\xeb:g'}}, 0x85) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x103040, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) [ 2350.131572][ T4714] fuse: Unknown parameter 'euid<00000000000000000000' [ 2350.188132][ T4716] fuse: Unknown parameter 'euid<00000000000000000000' 10:19:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01}}, './file0/file0\x00'}) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[], [{@euid_lt={'euid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x7a, 0x0, 0x63, 0x38, 0x37, 0x34, 0x34], 0x2d, [0x63, 0x63, 0x55, 0x3d], 0x2d, [0x63, 0x63, 0x62, 0x6a955aa14b22c2b2], 0x2d, [0x39, 0x61, 0x61, 0x66], 0x2d, [0x32, 0x34, 0x38, 0x62, 0x39, 0x66, 0x30, 0x39]}}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r2}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:19:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x85, 0x3, 0x0, {0x0, 0x64, 0x0, 'f\x8e\x06\xb9\x98\x10X\x1a\x04Y@Xuse\x00\xc4k>\x05\x81C\xd6\x8fy\xb1[\x17\xc1\xe2u*\xc9Gr\xc7\xcdI\xf6\xd1}K\x1d[]\t\xcf\xdb\r\xd6\\p\xef\x17\xbaO\xbe\x06\xd4.\xf0O\x83\x8b]>\x8aT\x14\x15\x9f\x01\xef[%\xe4\x1c\xc8\xb7\xffj\xea\xcb\x8a\xfd\x054E\xfe\xe3\x16A\xc1\xab\x8f9\x9f\xeb:g'}}, 0x85) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x103040, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) [ 2350.711173][ T4672] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:19:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:19:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0/file0\x00', 0x40, 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0xc608c, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}, {@allow_other}], [{@appraise}, {@subj_type={'subj_type', 0x3d, 'rootmode'}}, {@fsname={'fsname', 0x3d, '{\xc8'}}, {@fowner_gt={'fowner>', r2}}, {@dont_hash}]}}) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2350.754567][ T4732] fuse: Unknown parameter 'euid<00000000000000000000' [ 2351.040476][ T4672] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2351.227141][ T4672] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 10:19:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async, rerun: 64) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x85, 0x3, 0x0, {0x0, 0x64, 0x0, 'f\x8e\x06\xb9\x98\x10X\x1a\x04Y@Xuse\x00\xc4k>\x05\x81C\xd6\x8fy\xb1[\x17\xc1\xe2u*\xc9Gr\xc7\xcdI\xf6\xd1}K\x1d[]\t\xcf\xdb\r\xd6\\p\xef\x17\xbaO\xbe\x06\xd4.\xf0O\x83\x8b]>\x8aT\x14\x15\x9f\x01\xef[%\xe4\x1c\xc8\xb7\xffj\xea\xcb\x8a\xfd\x054E\xfe\xe3\x16A\xc1\xab\x8f9\x9f\xeb:g'}}, 0x85) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) (async) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x103040, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1}, './file0/file0\x00'}) 10:19:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100, 0x10, &(0x7f0000000100)) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x80, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100, 0x10, &(0x7f0000000100)) (async) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x80, &(0x7f00000002c0)) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}}, 0x0, 0x0, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) (async) [ 2351.503497][ T4672] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2351.803318][T21762] Bluetooth: hci12: command 0x041b tx timeout 10:19:18 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2352.184532][ T4672] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2352.211848][ T4672] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2352.232614][ T4672] netdevsim netdevsim2 netdevsim2: renamed from eth2 10:19:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75d3ffce8cfc87fd5b050b197a705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:19:18 executing program 3: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000001040), 0x1112c2, 0x12c) write$damon_schemes(r0, &(0x7f0000001080)={0xffffffffffffff7f, 0xffffffff, 0x20, 0x20, 0x9, 0x60, 0x7}, 0x66) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7b4827b8fadd582571fb9ddc2151f7eb769130760a28484fda6c014c179078", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) statfs(&(0x7f0000000000)='.\x00', &(0x7f0000000040)=""/4096) mount$nfs(&(0x7f00000011c0)='/sys/kernel/debug/damon/schemes\x00', &(0x7f0000001200)='./file1\x00', &(0x7f0000001240), 0x1000, &(0x7f0000001280)={[{'\\/'}, {'/dev/fuse\x00'}, {'/sys/kernel/debug/damon/schemes\x00'}, {'/dev/fuse\x00'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 2352.259305][ T4672] netdevsim netdevsim2 netdevsim3: renamed from eth3 10:19:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) open(&(0x7f0000000180)='./file0/file0\x00', 0x40, 0x4) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0xc608c, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}, {@allow_other}], [{@appraise}, {@subj_type={'subj_type', 0x3d, 'rootmode'}}, {@fsname={'fsname', 0x3d, '{\xc8'}}, {@fowner_gt={'fowner>', r2}}, {@dont_hash}]}}) (async) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2352.526373][ T4672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2352.586110][ T4672] 8021q: adding VLAN 0 to HW filter on device team0 [ 2352.617957][T14911] bridge0: port 1(bridge_slave_0) entered blocking state [ 2352.625202][T14911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2352.667130][T14911] bridge0: port 2(bridge_slave_1) entered blocking state [ 2352.674397][T14911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2352.788754][ T4759] fuse: Unknown parameter 'grouΌ[ zp_id' [ 2352.808866][ T4758] fuse: Bad value for 'group_id' 10:19:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75d3ffce8cfc87fd5b050b197a705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x0, 0x0, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 10:19:19 executing program 3: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000001040), 0x1112c2, 0x12c) write$damon_schemes(r0, &(0x7f0000001080)={0xffffffffffffff7f, 0xffffffff, 0x20, 0x20, 0x9, 0x60, 0x7}, 0x66) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7b4827b8fadd582571fb9ddc2151f7eb769130760a28484fda6c014c179078", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7b4827b8fadd582571fb9ddc2151f7eb769130760a28484fda6c014c179078", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) statfs(&(0x7f0000000000)='.\x00', &(0x7f0000000040)=""/4096) mount$nfs(&(0x7f00000011c0)='/sys/kernel/debug/damon/schemes\x00', &(0x7f0000001200)='./file1\x00', &(0x7f0000001240), 0x1000, &(0x7f0000001280)={[{'\\/'}, {'/dev/fuse\x00'}, {'/sys/kernel/debug/damon/schemes\x00'}, {'/dev/fuse\x00'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 10:19:19 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 10:19:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75d3ffce8cfc87fd5b050b197a705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00'], 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2353.269327][ T4772] fuse: Unknown parameter 'grouΌ[ zp_id' [ 2353.289822][ T4776] fuse: Bad value for 'group_id' [ 2353.289893][ T4774] fuse: Bad value for 'group_id' 10:19:19 executing program 3: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f0000001040), 0x1112c2, 0x12c) write$damon_schemes(r0, &(0x7f0000001080)={0xffffffffffffff7f, 0xffffffff, 0x20, 0x20, 0x9, 0x60, 0x7}, 0x66) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000001100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7b4827b8fadd582571fb9ddc2151f7eb769130760a28484fda6c014c179078", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (async) statfs(&(0x7f0000000000)='.\x00', &(0x7f0000000040)=""/4096) (async) mount$nfs(&(0x7f00000011c0)='/sys/kernel/debug/damon/schemes\x00', &(0x7f0000001200)='./file1\x00', &(0x7f0000001240), 0x1000, &(0x7f0000001280)={[{'\\/'}, {'/dev/fuse\x00'}, {'/sys/kernel/debug/damon/schemes\x00'}, {'/dev/fuse\x00'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 2353.416322][ T4672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2353.457192][ T29] INFO: task syz-executor.1:3841 blocked for more than 143 seconds. [ 2353.468618][ T29] Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2353.480823][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2353.497597][ T29] task:syz-executor.1 state:D stack:26864 pid:3841 tgid:3834 ppid:2617 flags:0x00004006 [ 2353.521658][ T29] Call Trace: [ 2353.526933][ T29] [ 2353.532513][ T29] __schedule+0x177f/0x49a0 [ 2353.543067][ T29] ? __pfx___schedule+0x10/0x10 [ 2353.551538][ T29] ? __pfx_lock_release+0x10/0x10 [ 2353.561324][ T29] ? _raw_spin_unlock_irqrestore+0xdd/0x140 [ 2353.569816][ T29] ? schedule+0x8e/0x260 [ 2353.576605][ T29] schedule+0x149/0x260 [ 2353.583192][ T29] fuse_simple_request+0x1198/0x1b90 [ 2353.589252][ T4672] veth0_vlan: entered promiscuous mode [ 2353.591193][ T29] ? __pfx_fuse_simple_request+0x10/0x10 [ 2353.611436][ T29] ? __pfx_autoremove_wake_function+0x10/0x10 [ 2353.625129][ T29] ? __pfx_autoremove_wake_function+0x10/0x10 [ 2353.636001][ T29] ? __pfx_autoremove_wake_function+0x10/0x10 [ 2353.643378][ T29] ? __kasan_kmalloc+0x98/0xb0 [ 2353.649469][ T4672] veth1_vlan: entered promiscuous mode [ 2353.649645][ T29] ? fuse_lookup_name+0x152/0x830 [ 2353.663614][ T29] ? kmalloc_trace+0x1d6/0x360 [ 2353.683959][ T29] ? fuse_lookup_name+0x152/0x830 [ 2353.697745][ T29] fuse_lookup_name+0x332/0x830 [ 2353.704725][ T29] ? __pfx_fuse_lookup_name+0x10/0x10 [ 2353.717716][ T29] ? fuse_lock_inode+0xd3/0x120 [ 2353.722867][ T29] fuse_lookup+0x182/0x600 [ 2353.728960][ T29] ? __pfx_fuse_lookup+0x10/0x10 [ 2353.734192][ T29] ? do_raw_spin_lock+0x14e/0x370 [ 2353.740659][ T29] ? _raw_spin_unlock+0x28/0x50 [ 2353.745983][ T29] ? d_alloc+0x142/0x190 [ 2353.750464][ T29] lookup_one_qstr_excl+0x11f/0x260 [ 2353.757959][ T29] filename_create+0x297/0x540 [ 2353.767815][ T29] ? __pfx_filename_create+0x10/0x10 [ 2353.780457][ T29] do_mkdirat+0xbd/0x3a0 [ 2353.790770][ T29] ? __pfx_do_mkdirat+0x10/0x10 [ 2353.801814][ T29] ? getname_flags+0x1fd/0x4f0 [ 2353.802436][ T4672] veth0_macvtap: entered promiscuous mode [ 2353.827316][ T29] __x64_sys_mkdirat+0x89/0xa0 10:19:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) open(&(0x7f0000000180)='./file0/file0\x00', 0x40, 0x4) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pread64(r0, &(0x7f0000004200)=""/236, 0xec, 0x0) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0xc608c, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}, {@allow_other}], [{@appraise}, {@subj_type={'subj_type', 0x3d, 'rootmode'}}, {@fsname={'fsname', 0x3d, '{\xc8'}}, {@fowner_gt={'fowner>', r2}}, {@dont_hash}]}}) write$FUSE_INIT(r0, &(0x7f0000004300)={0x50, 0x0, r1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2353.849502][ T29] do_syscall_64+0xf9/0x240 [ 2353.856532][T21762] Bluetooth: hci12: command 0x040f tx timeout [ 2353.859904][ T4672] veth1_macvtap: entered promiscuous mode [ 2353.870491][ T29] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2353.906726][ T29] RIP: 0033:0x7f75e427dda9 [ 2353.907791][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2353.924914][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2353.934802][ T29] RSP: 002b:00007f75e4fb00c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2353.934837][ T29] RAX: ffffffffffffffda RBX: 00007f75e43ac050 RCX: 00007f75e427dda9 [ 2353.945338][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2353.966943][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2353.977385][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2353.986732][ T4778] fuse: Unknown parameter 'grouΌ[ zp_id' [ 2353.988317][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2353.994492][ T29] RDX: 0000000000000000 RSI: 0000000020004380 RDI: ffffffffffffff9c 10:19:20 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2354.087708][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.105951][ T29] RBP: 00007f75e42ca47a R08: 0000000000000000 R09: 0000000000000000 [ 2354.122302][ T29] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2354.137094][ T29] R13: 000000000000006e R14: 00007f75e43ac050 R15: 00007ffc18242d88 [ 2354.145168][ T29] [ 2354.145925][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.158134][ T29] INFO: task syz-executor.1:3845 blocked for more than 144 seconds. [ 2354.158166][ T29] Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2354.158180][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2354.158191][ T29] task:syz-executor.1 state:D stack:27568 pid:3845 tgid:3834 ppid:2617 flags:0x00004006 [ 2354.158236][ T29] Call Trace: [ 2354.158245][ T29] [ 2354.158260][ T29] __schedule+0x177f/0x49a0 [ 2354.158324][ T29] ? __pfx___schedule+0x10/0x10 [ 2354.158357][ T29] ? __pfx_lock_release+0x10/0x10 [ 2354.158392][ T29] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2354.178241][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.227204][ T29] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 2354.238664][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.249964][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.262035][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.272903][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.286948][ T29] ? _raw_spin_lock_irq+0xdf/0x120 [ 2354.296303][ T29] ? schedule+0x8e/0x260 [ 2354.306505][ T29] schedule+0x149/0x260 [ 2354.310837][ T29] schedule_preempt_disabled+0x13/0x30 [ 2354.332777][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.336268][ T29] rwsem_down_write_slowpath+0xeea/0x13b0 [ 2354.363417][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.382386][ T29] ? rwsem_down_write_slowpath+0xa05/0x13b0 [ 2354.385968][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.398516][ T29] ? __pfx_rwsem_down_write_slowpath+0x10/0x10 [ 2354.415014][ T29] ? __pfx_lock_acquire+0x10/0x10 [ 2354.421639][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.424384][ T4784] fuse: Bad value for 'group_id' [ 2354.445859][ T29] __down_write_common+0x1ae/0x200 [ 2354.448308][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.451057][ T29] ? __pfx___down_write_common+0x10/0x10 [ 2354.478355][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.489269][ T29] fuse_reverse_inval_entry+0x62/0x730 10:19:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2180800, &(0x7f0000000240)=ANY=[@ANYBLOB="9fddd48880f64403da5d64d4e64ae5bc35f0f7d4070584d9a3679c4e7777e0d8eb4dc3d720ff614609bbfc40d90878fef563b8157bccd11d92a8050b8574888de63f47603414574d808965dd6f4ff2ea9f3e23962ae444911079889aac482b65e2748f0ed88caf080dbc625c799b322e957ba0ead21df8ac05be2e1d95f429d8e7486db941588e0955f8612409250951a1d6f9a63f0a9d5aa3e039551f9b0d34505d5eb4f34b55ac20dc38457347d4c6a5d6ef1451b97ffe8387ba61720313bc31a1b8e1cf537019a75d97b70eac57ddada300cdd94740a29e051908f3", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fscontext=sysadm_u,\x00']) mount$cgroup2(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x4, &(0x7f0000000200)={[{@memory_localevents}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_role={'obj_role', 0x3d, ']!\xba'}}]}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0xffffffffffffffda, r1, {0x7, 0x27, 0x7, 0x100, 0xff4f, 0x7c9, 0x3ffc0000, 0x8000}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f01696c653000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x2004, &(0x7f00000000c0)='rootmode') 10:19:20 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2354.494813][ T29] fuse_dev_do_write+0x3389/0x54f0 [ 2354.511167][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.516433][ T29] ? __pfx___schedule+0x10/0x10 [ 2354.545905][ T29] ? __pfx_validate_chain+0x10/0x10 [ 2354.551195][ T29] ? __pfx_fuse_dev_do_write+0x10/0x10 [ 2354.556028][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.572765][ T29] ? plist_check_list+0x2cb/0x300 [ 2354.576183][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.585871][ T29] ? futex_wait_queue+0x27/0x1d0 [ 2354.592938][ T29] ? do_raw_spin_unlock+0x13b/0x8b0 [ 2354.597144][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2354.606389][ T29] ? schedule+0x8e/0x260 [ 2354.612875][ T29] ? schedule+0x8e/0x260 [ 2354.626997][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.635865][ T29] ? schedule+0x153/0x260 [ 2354.642396][ T29] ? futex_wait_queue+0x27/0x1d0 [ 2354.658654][ T29] ? futex_wait_queue+0x14d/0x1d0 [ 2354.660191][ T4672] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2354.663734][ T29] ? futex_unqueue+0xcb/0xf0 [ 2354.663774][ T29] ? __futex_wait+0x286/0x320 [ 2354.722284][ T29] ? mark_lock+0x9a/0x350 [ 2354.743137][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2354.743755][ T29] ? __pfx___futex_wait+0x10/0x10 [ 2354.796013][ T29] fuse_dev_write+0x149/0x1d0 [ 2354.803170][ T29] ? __pfx_fuse_dev_write+0x10/0x10 [ 2354.809256][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.827317][ T29] ? bpf_lsm_file_permission+0x9/0x10 [ 2354.844595][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2354.867405][ T29] ? security_file_permission+0x7f/0xa0 [ 2354.886057][ T29] vfs_write+0xa81/0xcb0 [ 2354.890470][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.900834][ T29] ? __pfx_lock_release+0x10/0x10 [ 2354.915950][ T29] ? __pfx_vfs_write+0x10/0x10 [ 2354.922397][ T4788] fuse: Bad value for 'fd' [ 2354.923147][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2354.941617][ T29] ? __fget_files+0x3f4/0x470 10:19:21 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) (async) [ 2354.955927][ T29] ? __fdget_pos+0x1a1/0x320 [ 2354.960691][ T29] ksys_write+0x1a0/0x2c0 [ 2354.965155][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2354.977973][ T29] ? __pfx_ksys_write+0x10/0x10 [ 2354.984338][ T29] ? do_syscall_64+0x108/0x240 [ 2354.992923][ T29] ? do_syscall_64+0xb4/0x240 [ 2354.997823][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.008606][ T29] do_syscall_64+0xf9/0x240 [ 2355.013239][ T29] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 2355.019361][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.029326][ T29] RIP: 0033:0x7f75e427dda9 [ 2355.034341][ T29] RSP: 002b:00007f75e4f8f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2355.079711][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.104316][ T29] RAX: ffffffffffffffda RBX: 00007f75e43ac120 RCX: 00007f75e427dda9 [ 2355.113183][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.155954][ T29] RDX: 0000000000000029 RSI: 00000000200043c0 RDI: 0000000000000003 [ 2355.164004][ T29] RBP: 00007f75e42ca47a R08: 0000000000000000 R09: 0000000000000000 [ 2355.175874][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.206179][ T29] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2355.217813][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.228974][ T29] R13: 000000000000006e R14: 00007f75e43ac120 R15: 00007ffc18242d88 [ 2355.251423][ T29] [ 2355.254608][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.275908][ T29] [ 2355.275908][ T29] Showing all locks held in the system: [ 2355.283691][ T29] 1 lock held by khungtaskd/29: [ 2355.308147][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.319089][ T29] #0: ffffffff8e130ae0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x2a0 [ 2355.335879][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.348967][ T29] 2 locks held by getty/4812: [ 2355.353697][ T29] #0: ffff88807b8000a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2355.363707][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.373699][ T29] #1: ffffc90002efe2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6b4/0x1e10 [ 2355.387165][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.397731][ T29] 2 locks held by kworker/1:3/5067: [ 2355.402955][ T29] 3 locks held by kworker/0:5/5180: 10:19:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2180800, &(0x7f0000000240)=ANY=[@ANYBLOB="9fddd48880f64403da5d64d4e64ae5bc35f0f7d4070584d9a3679c4e7777e0d8eb4dc3d720ff614609bbfc40d90878fef563b8157bccd11d92a8050b8574888de63f47603414574d808965dd6f4ff2ea9f3e23962ae444911079889aac482b65e2748f0ed88caf080dbc625c799b322e957ba0ead21df8ac05be2e1d95f429d8e7486db941588e0955f8612409250951a1d6f9a63f0a9d5aa3e039551f9b0d34505d5eb4f34b55ac20dc38457347d4c6a5d6ef1451b97ffe8387ba61720313bc31a1b8e1cf537019a75d97b70eac57ddada300cdd94740a29e051908f3", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fscontext=sysadm_u,\x00']) (async) mount$cgroup2(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x4, &(0x7f0000000200)={[{@memory_localevents}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_role={'obj_role', 0x3d, ']!\xba'}}]}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0xffffffffffffffda, r1, {0x7, 0x27, 0x7, 0x100, 0xff4f, 0x7c9, 0x3ffc0000, 0x8000}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f01696c653000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x2004, &(0x7f00000000c0)='rootmode') [ 2355.408346][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.420565][ T29] #0: ffff88802af87938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x1420 [ 2355.432916][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.449843][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.465927][ T29] #1: ffffc9000476fd20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x1420 [ 2355.485896][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.496488][ T29] #2: ffffffff8f362ac8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xd0/0x16f0 [ 2355.513561][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.523568][ T29] 2 locks held by kworker/0:6/5185: [ 2355.535867][ T29] #0: ffff888014c8e938 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x1420 [ 2355.547674][ T4672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2355.575884][ T29] #1: ffffc9000479fd20 ((work_completion)(&rew->rew_work)){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x1420 [ 2355.588409][ T4672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2355.608152][ T4672] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2355.615463][ T29] 3 locks held by kworker/u4:1/10959: [ 2355.635995][ T29] 3 locks held by kworker/1:0/14911: [ 2355.641363][ T29] #0: ffff88802af87938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x1420 [ 2355.665747][ T4672] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2355.705969][ T4672] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2355.715357][ T29] #1: ffffc90014befd20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x825/0x1420 [ 2355.735919][ T4672] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2355.744688][ T4672] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2355.795934][ T29] #2: ffffffff8f362ac8 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xd0/0x16f0 [ 2355.835986][ T29] 2 locks held by kworker/u4:5/22053: [ 2355.841437][ T29] 3 locks held by kworker/1:6/1602: [ 2355.885977][ T29] 4 locks held by syz-executor.3/3049: [ 2355.891622][ T29] #0: ffff88807b8f8420 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 2355.893944][ T4795] fuse: Bad value for 'fd' [ 2355.929457][ T29] #1: ffff888028732c00 (&type->i_mutex_dir_key#3/1){+.+.}-{3:3}, at: filename_create+0x260/0x540 [ 2355.936132][T21762] Bluetooth: hci12: command 0x0419 tx timeout [ 2355.947857][ T4795] fuse: Bad value for 'fd' 10:19:22 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 2355.975986][ T29] #2: ffff888047f80b20 (&mm->mmap_lock/1){+.+.}-{3:3}, at: copy_mm+0x3cb/0x21b0 [ 2355.985248][ T29] #3: ffff8880b953c918 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 10:19:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2356.046683][ T29] 3 locks held by syz-executor.0/3538: [ 2356.085931][ T29] #0: ffff88807b8f8420 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 2356.100282][ T29] #1: ffff8880382f7200 (&type->i_mutex_dir_key#3/1){+.+.}-{3:3}, at: do_unlinkat+0x26a/0x830 [ 2356.132811][ T29] #2: ffff8880b943c918 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 10:19:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x2180800, &(0x7f0000000240)=ANY=[@ANYBLOB="9fddd48880f64403da5d64d4e64ae5bc35f0f7d4070584d9a3679c4e7777e0d8eb4dc3d720ff614609bbfc40d90878fef563b8157bccd11d92a8050b8574888de63f47603414574d808965dd6f4ff2ea9f3e23962ae444911079889aac482b65e2748f0ed88caf080dbc625c799b322e957ba0ead21df8ac05be2e1d95f429d8e7486db941588e0955f8612409250951a1d6f9a63f0a9d5aa3e039551f9b0d34505d5eb4f34b55ac20dc38457347d4c6a5d6ef1451b97ffe8387ba61720313bc31a1b8e1cf537019a75d97b70eac57ddada300cdd94740a29e051908f3", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fscontext=sysadm_u,\x00']) (async) mount$cgroup2(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x4, &(0x7f0000000200)={[{@memory_localevents}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_role={'obj_role', 0x3d, ']!\xba'}}]}) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0xffffffffffffffda, r1, {0x7, 0x27, 0x7, 0x100, 0xff4f, 0x7c9, 0x3ffc0000, 0x8000}}, 0x50) (async, rerun: 32) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) (rerun: 32) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f01696c653000"], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x2004, &(0x7f00000000c0)='rootmode') [ 2356.160523][ T29] 2 locks held by syz-executor.4/3541: [ 2356.198793][ T29] #0: ffff88807b8f8420 (sb_writers#4){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 2356.223633][ T29] #1: ffff8880382f2200 (&type->i_mutex_dir_key#3/1){+.+.}-{3:3}, at: do_unlinkat+0x26a/0x830 [ 2356.248315][ T29] 3 locks held by syz-executor.1/3841: [ 2356.254829][ T29] #0: ffff88804eee2420 (sb_writers#30){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 2356.278313][ T29] #1: ffff8880378c3090 (&type->i_mutex_dir_key#23/1){+.+.}-{3:3}, at: filename_create+0x260/0x540 [ 2356.316288][ T29] #2: ffff8880378c3508 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xd3/0x120 [ 2356.325562][ T29] 2 locks held by syz-executor.1/3845: [ 2356.337056][ T29] #0: ffff888044a42338 (&fc->killsb){++++}-{3:3}, at: fuse_dev_do_write+0x331f/0x54f0 [ 2356.363074][ T29] #1: ffff8880378c3090 (&type->i_mutex_dir_key#23/1){+.+.}-{3:3}, at: fuse_reverse_inval_entry+0x62/0x730 [ 2356.393774][ T29] 3 locks held by syz-executor.1/4189: [ 2356.405969][ T29] #0: ffff888068352420 (sb_writers#30){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 2356.415332][ T29] #1: ffff8880378c7410 (&type->i_mutex_dir_key#23/1){+.+.}-{3:3}, at: filename_create+0x260/0x540 [ 2356.460789][ T29] #2: ffff8880378c7888 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xd3/0x120 [ 2356.474418][ T29] 2 locks held by syz-executor.1/4191: [ 2356.506767][ T29] #0: ffff888043fa7338 (&fc->killsb){++++}-{3:3}, at: fuse_dev_do_write+0x331f/0x54f0 [ 2356.528162][ T29] #1: ffff8880378c7410 (&type->i_mutex_dir_key#23/1){+.+.}-{3:3}, at: fuse_reverse_inval_entry+0x62/0x730 [ 2356.610371][ T29] 3 locks held by syz-executor.1/4410: [ 2356.633523][ T29] #0: ffff888048b5c420 (sb_writers#30){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 2356.659719][ T29] #1: ffff8880439d0810 (&type->i_mutex_dir_key#23/1){+.+.}-{3:3}, at: filename_create+0x260/0x540 [ 2356.687917][ T29] #2: ffff8880439d0c88 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xd3/0x120 [ 2356.705872][ T29] 3 locks held by syz-executor.2/4523: [ 2356.711401][ T29] #0: ffff8880454f0420 (sb_writers#30){.+.+}-{0:0}, at: mnt_want_write+0x3f/0x90 [ 2356.736778][ T29] #1: ffff8880378c4b90 (&type->i_mutex_dir_key#23/1){+.+.}-{3:3}, at: filename_create+0x260/0x540 10:19:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) read$FUSE(r0, &(0x7f00000002c0)={0x2020}, 0x2020) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x22) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f0000000100)={0x0, 0x7, 0x1}) [ 2356.755895][ T29] #2: ffff8880378c5008 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xd3/0x120 [ 2356.765159][ T29] 2 locks held by syz-executor.2/4527: [ 2356.788171][ T4802] fuse: Bad value for 'fd' [ 2356.798132][ T29] #0: ffff88808b214338 (&fc->killsb){++++}-{3:3}, at: fuse_dev_do_write+0x331f/0x54f0 [ 2356.819679][ T29] #1: ffff8880378c4b90 (&type->i_mutex_dir_key#23/1){+.+.}-{3:3}, at: fuse_reverse_inval_entry+0x62/0x730 [ 2356.855970][ T29] 1 lock held by syz-executor.1/4547: 10:19:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file3\x00', 0x46942, 0x0) r1 = open(&(0x7f00000000c0)='./file1\x00', 0x185142, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x1000000201014) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x640001, 0x108) renameat2(r1, &(0x7f0000000000)='./file0/file0\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000480)=ANY=[]) mkdirat(0xffffffffffffff9c, &(0x7f0000004380)='./file0/file0\x00', 0x0) [ 2356.861465][ T29] #0: ffffffff8e136478 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3a3/0x890 [ 2356.886045][ T29] 3 locks held by syz-executor.2/4672: [ 2356.891581][ T29] #0: ffffffff8f362ac8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x82c/0x1040 [ 2356.926036][ T29] #1: ffff88808704d3e8 (&wg->device_update_lock){+.+.}-{3:3}, at: wg_open+0x22d/0x420 [ 2356.946198][ T29] #2: ffffffff8e136478 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x46c/0x890 [ 2356.959188][ T4810] fuse: Bad value for 'fd' [ 2356.974184][ T29] [ 2356.995211][ T29] ============================================= [ 2356.995211][ T29] [ 2357.015865][ T29] NMI backtrace for cpu 0 [ 2357.020265][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2357.030120][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2357.040218][ T29] Call Trace: [ 2357.043539][ T29] [ 2357.046507][ T29] dump_stack_lvl+0x1e7/0x2e0 [ 2357.051247][ T29] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2357.056503][ T29] ? __pfx__printk+0x10/0x10 [ 2357.061138][ T29] ? vprintk_emit+0x607/0x720 [ 2357.065863][ T29] ? __pfx_vprintk_emit+0x10/0x10 [ 2357.070951][ T29] nmi_cpu_backtrace+0x49c/0x4d0 [ 2357.075937][ T29] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 2357.081441][ T29] ? _printk+0xd5/0x120 [ 2357.085641][ T29] ? __pfx__printk+0x10/0x10 [ 2357.090285][ T29] ? __wake_up_klogd+0xcc/0x110 10:19:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000043c0)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) [ 2357.095204][ T29] ? __pfx__printk+0x10/0x10 [ 2357.099865][ T29] ? __rcu_read_unlock+0xa0/0x110 [ 2357.104955][ T29] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 2357.111031][ T29] nmi_trigger_cpumask_backtrace+0x198/0x320 [ 2357.117064][ T29] watchdog+0xfaf/0xff0 [ 2357.121279][ T29] ? watchdog+0x1e9/0xff0 [ 2357.125756][ T29] ? __pfx_watchdog+0x10/0x10 [ 2357.130487][ T29] kthread+0x2ef/0x390 [ 2357.134602][ T29] ? __pfx_watchdog+0x10/0x10 [ 2357.139328][ T29] ? __pfx_kthread+0x10/0x10 [ 2357.143961][ T29] ret_from_fork+0x4b/0x80 [ 2357.148461][ T29] ? __pfx_kthread+0x10/0x10 [ 2357.153092][ T29] ret_from_fork_asm+0x1b/0x30 [ 2357.157958][ T29] [ 2357.163264][ T29] Sending NMI from CPU 0 to CPUs 1: [ 2357.168840][ C1] NMI backtrace for cpu 1 [ 2357.168852][ C1] CPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2357.168873][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2357.168884][ C1] Workqueue: events_unbound cfg80211_wiphy_work [ 2357.169004][ C1] RIP: 0010:__sanitizer_cov_trace_switch+0xbb/0x120 [ 2357.169036][ C1] Code: c2 49 39 d2 74 71 4c 8b 74 d6 10 65 8b 05 75 52 70 7e a9 00 01 ff 00 74 11 a9 00 01 00 00 74 de 41 83 bb fc 15 00 00 00 74 d4 <41> 8b 83 d8 15 00 00 83 f8 03 75 c8 49 8b 8b e0 15 00 00 45 8b bb [ 2357.169052][ C1] RSP: 0000:ffffc90000107198 EFLAGS: 00000246 [ 2357.169067][ C1] RAX: 0000000080000000 RBX: 0000000000000000 RCX: ffff88801729bb80 [ 2357.169080][ C1] RDX: 000000000000001e RSI: ffffffff8f5de000 RDI: 0000000000000001 [ 2357.169092][ C1] RBP: ffffc900001075d0 R08: 0000000000000001 R09: ffffffff8ade3038 [ 2357.169105][ C1] R10: 000000000000002b R11: ffff88801729bb80 R12: ffff88804ad1247c [ 2357.169118][ C1] R13: dffffc0000000000 R14: 00000000000000bf R15: ffff88804ad1247c [ 2357.169132][ C1] FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 [ 2357.169148][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2357.169161][ C1] CR2: 00007fcc342d56c6 CR3: 0000000029d4c000 CR4: 00000000003506f0 [ 2357.169177][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2357.169188][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2357.169200][ C1] Call Trace: [ 2357.169207][ C1] [ 2357.169214][ C1] ? nmi_cpu_backtrace+0x3c2/0x4d0 [ 2357.169233][ C1] ? __pfx_lock_acquire+0x10/0x10 [ 2357.169262][ C1] ? __pfx_nmi_cpu_backtrace+0x10/0x10 [ 2357.169280][ C1] ? nmi_handle+0x2a/0x580 [ 2357.169306][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 2357.169334][ C1] ? nmi_handle+0x14f/0x580 [ 2357.169351][ C1] ? nmi_handle+0x2a/0x580 [ 2357.169368][ C1] ? __sanitizer_cov_trace_switch+0xbb/0x120 [ 2357.169394][ C1] ? default_do_nmi+0x63/0x160 [ 2357.169413][ C1] ? exc_nmi+0x121/0x210 [ 2357.169430][ C1] ? end_repeat_nmi+0xf/0x60 [ 2357.169459][ C1] ? _ieee802_11_parse_elems_full+0xc18/0x4340 [ 2357.169530][ C1] ? __sanitizer_cov_trace_switch+0xbb/0x120 [ 2357.169557][ C1] ? __sanitizer_cov_trace_switch+0xbb/0x120 [ 2357.169584][ C1] ? __sanitizer_cov_trace_switch+0xbb/0x120 [ 2357.169611][ C1] [ 2357.169616][ C1] [ 2357.169624][ C1] _ieee802_11_parse_elems_full+0xc18/0x4340 [ 2357.169644][ C1] ? ret_from_fork_asm+0x1b/0x30 [ 2357.169717][ C1] ? __pfx__ieee802_11_parse_elems_full+0x10/0x10 [ 2357.169738][ C1] ? ieee802_11_parse_elems_full+0xe7/0x2470 [ 2357.169760][ C1] ? trace_kmalloc+0x1f/0xb0 [ 2357.169785][ C1] ? __kmalloc+0x24c/0x490 [ 2357.169809][ C1] ? cfg80211_find_elem_match+0x174/0x1b0 [ 2357.169850][ C1] ieee802_11_parse_elems_full+0xd47/0x2470 [ 2357.169878][ C1] ? __pfx_validate_chain+0x10/0x10 [ 2357.169899][ C1] ? __pfx_validate_chain+0x10/0x10 [ 2357.169924][ C1] ? __pfx_ieee802_11_parse_elems_full+0x10/0x10 [ 2357.169946][ C1] ? __lock_acquire+0x1345/0x1fd0 [ 2357.169975][ C1] ? mark_lock+0x9a/0x350 [ 2357.170000][ C1] ieee80211_ibss_rx_queued_mgmt+0x4b7/0x2cd0 [ 2357.170056][ C1] ? __pfx_ieee80211_ibss_rx_queued_mgmt+0x10/0x10 [ 2357.170086][ C1] ? mark_lock+0x9a/0x350 [ 2357.170105][ C1] ? lockdep_hardirqs_on_prepare+0x43c/0x780 [ 2357.170133][ C1] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 2357.170160][ C1] ? do_raw_spin_unlock+0x13b/0x8b0 [ 2357.170192][ C1] ieee80211_iface_work+0x809/0xd90 [ 2357.170238][ C1] cfg80211_wiphy_work+0x221/0x260 [ 2357.170267][ C1] ? process_scheduled_works+0x825/0x1420 [ 2357.170295][ C1] process_scheduled_works+0x913/0x1420 [ 2357.170341][ C1] ? __pfx_process_scheduled_works+0x10/0x10 [ 2357.170373][ C1] ? assign_work+0x364/0x3d0 [ 2357.170402][ C1] worker_thread+0xa5f/0x1000 [ 2357.170441][ C1] ? __pfx_worker_thread+0x10/0x10 [ 2357.170467][ C1] kthread+0x2ef/0x390 [ 2357.170486][ C1] ? __pfx_worker_thread+0x10/0x10 [ 2357.170512][ C1] ? __pfx_kthread+0x10/0x10 [ 2357.170530][ C1] ret_from_fork+0x4b/0x80 [ 2357.170554][ C1] ? __pfx_kthread+0x10/0x10 [ 2357.170573][ C1] ret_from_fork_asm+0x1b/0x30 [ 2357.170607][ C1] [ 2357.174264][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 2357.589913][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc3-syzkaller-00010-g6d280f4d760e #0 [ 2357.599732][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 2357.609804][ T29] Call Trace: [ 2357.613093][ T29] [ 2357.616043][ T29] dump_stack_lvl+0x1e7/0x2e0 [ 2357.620757][ T29] ? __pfx_dump_stack_lvl+0x10/0x10 [ 2357.625979][ T29] ? __pfx__printk+0x10/0x10 [ 2357.630589][ T29] ? vscnprintf+0x5d/0x90 [ 2357.634929][ T29] panic+0x349/0x860 [ 2357.638859][ T29] ? nmi_trigger_cpumask_backtrace+0x244/0x320 [ 2357.645023][ T29] ? __pfx_panic+0x10/0x10 [ 2357.649452][ T29] ? tick_nohz_tick_stopped+0x7b/0xc0 [ 2357.654842][ T29] ? __irq_work_queue_local+0x137/0x3e0 [ 2357.660406][ T29] ? preempt_schedule_thunk+0x1a/0x30 [ 2357.665796][ T29] ? nmi_trigger_cpumask_backtrace+0x244/0x320 [ 2357.671970][ T29] ? nmi_trigger_cpumask_backtrace+0x2d4/0x320 [ 2357.678135][ T29] ? nmi_trigger_cpumask_backtrace+0x2d9/0x320 [ 2357.684301][ T29] watchdog+0xfee/0xff0 [ 2357.688490][ T29] ? watchdog+0x1e9/0xff0 [ 2357.692840][ T29] ? __pfx_watchdog+0x10/0x10 [ 2357.697535][ T29] kthread+0x2ef/0x390 [ 2357.701625][ T29] ? __pfx_watchdog+0x10/0x10 [ 2357.706327][ T29] ? __pfx_kthread+0x10/0x10 [ 2357.710932][ T29] ret_from_fork+0x4b/0x80 [ 2357.715365][ T29] ? __pfx_kthread+0x10/0x10 [ 2357.719968][ T29] ret_from_fork_asm+0x1b/0x30 [ 2357.724760][ T29] [ 2357.728077][ T29] Kernel Offset: disabled [ 2357.732409][ T29] Rebooting in 86400 seconds..