2) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 331.614666][T13254] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 331.651456][T13258] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 331.932031][ T26] audit: type=1804 audit(1567155994.665:40): pid=13269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir930099252/syzkaller.J48sEC/139/file0/file0" dev="sda1" ino=16977 res=1 09:06:34 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000280)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x100000001, 0x4) 09:06:34 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000200)='fusectl\x00', 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x7, 0xa, &(0x7f0000001b80)=[{&(0x7f0000000440)="7176cd38044eda7f820dd905d6dd0f4f7bd3742f67e8422ccf520f958b29677496a4e0388bb0e2ad289df003864b5df9b355ba476e7a0989", 0x38, 0x6}, {&(0x7f0000000540)="be6d97d6bc4f1bc38f1f3ec699ac0afcfed1a199649d91d5754846622a7f49a5fa3cfac69b15298d52cef891408b84a6af5fd9d97b90", 0x36, 0x9}, {&(0x7f0000000640), 0x0, 0x4}, {&(0x7f0000000740)="518934062f71747f3c66fcb3b672b2e3a2c39a135343e29c568f4412372c35af754210da31a45349458030ddabf055d009cb0413702a9bbcb48f215d7fb0751aa5710296b0cc938f8123854efa31a3e759abcb71158aed1d276e8307d9c9fe5bc878", 0x62, 0x100000000}, {&(0x7f0000000840)="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", 0xf80, 0xcd}, {&(0x7f0000001840), 0x0, 0x8}, {&(0x7f00000018c0)}, {0x0, 0x0, 0xfff}, {0x0}, {&(0x7f0000001ac0)="23377ac8ac144a9b9ed93c46736451942508c204cb072aeec920dc1f033553787a10e0c2bf7fedf34cf6dc969bfe0314a6b3a1982535d5680570b9a481fe28c486793bb884527b35fc9a3a7fe7d56e7cb30fb527508d5dad7b64d16e158dce37ebf90e58", 0x64}], 0x4000, &(0x7f0000000640)=ANY=[@ANYBLOB="756e695f786c617c653d312c6d6561737572652c636f6e746578743d73746166665f752c007b3c278013aa1e443b165e3b2f4e787360f82b27a25f7e890d14ebd9256f3f1413789654afcd137f4159b2ae1d0d0213bb0c54f2a06b8b3e2bee6d2633aebfa656a7728ddb044500000000e6d70f68e576dddc15c5ebe2a229ccd7d4eeaab1f242bd781843ff2b1ac9dfddc0b39820be8a97ca0a0876d81f14235df73a7e9b39c146563d1981b6d4f0a9dba81b2570c8ffb0dd77ecd64f2266eb0aaa"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2000, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) write$rfkill(r0, &(0x7f0000000240)={0x60, 0x9, 0x3}, 0x8) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc00000006c000000000000", 0x4c}], 0x1}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000600)={@empty}) 09:06:34 executing program 0: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) r1 = dup(r0) fsetxattr$security_evm(r0, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@v2={0x5, 0x2, 0xc, 0x3f, 0x84, "12f533ab8ca6691aa4fd9b1c00ce5b2176421f578e81665439113342e6aea1ce6cc0d5f28216909f17d057adf65aa66c8b4943d286d83632ca384c7e607247a2d1729556486a34e8fad3e9ccbb30897b61c0e807abf4b7d941b1f3179f43579a798795f1ada9014c781cfc1b4f66625826445058bfbeb28e1e64d08916137685fbfb4935"}, 0x8e, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240), 0x111}}, 0x20) socket$unix(0x1, 0x5, 0x0) fcntl$addseals(r0, 0x409, 0x5) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x0, 0x2) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xd, 0x80001) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80100100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xcc, r3, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xa2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x180000}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xcc}, 0x1, 0x0, 0x0, 0x800}, 0x40080) ioctl$FS_IOC_FSGETXATTR(r2, 0x8008551c, &(0x7f0000000280)={0x0, 0x1}) 09:06:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x480800, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000100)={r2, 0x1}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xe) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 09:06:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlockall(0x7) 09:06:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 332.348356][T13289] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, [ 332.425597][T13298] input: syz0 as /devices/virtual/input/input17 09:06:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 332.470726][T13298] input: failed to attach handler leds to device input17, error: -6 [ 332.525360][T13293] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv1, 09:06:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000080)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x980914, 0x1}) 09:06:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') setsockopt$inet_tcp_buf(r0, 0x6, 0x379027451b36fed3, &(0x7f0000000140)="fc49d2633df0907bee0418d559a40b1c8435fa1ede1cd48ecb79e6f42ff7aaef7707b01e7f187bb8403720f648a862b74607b93e4beaf891b77562f558bf0cda3381d98f7df2369d6c34fc024dd750398b2a1429a688660c11d2b2415701b0870560025776db83948f3b468175606a6be55cde38d927beb6c31e4ef5e6d8c12d31c15f10d9a3f8e284e9aec4fb6a5bf9dd04becd54d98ebd8ed339c76ce2f7e3177c0fc0d02d57", 0xa7) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000012c0)={@dev, @remote}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) socket$inet(0x2, 0x200000002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='erspan0\x00') 09:06:35 executing program 0: setresgid(0x0, 0xee00, 0x0) setuid(0xee01) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x80000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) r1 = getegid() setresgid(0x0, 0x0, r1) setresgid(r1, 0x0, r1) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x6, 0x5, 0x1, 0x3, 0x0, 0xfffffffffffffffe, 0x2, 0xd, 0x5, 0x100, 0x8000, 0x0, 0xa5, 0x90, 0x2, 0x29}}) 09:06:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:35 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$sock_SIOCGPGRP(r0, 0x8901, &(0x7f0000000600)) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r2, 0x8, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x400}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1133d43c70670f77}, 0x4000000) socket$pppoe(0x18, 0x1, 0x0) getresuid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf3b, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="cc791fcc427ded400d95ce5d7927754187db1e31f524a411b507654cd4efc09af0d5908cebb22284acb439503cc9d83df88bad19aa3af6f5728b964a03baa6432bac08840f30c69a939fb5bc4fe11814bd89ad16b11a257c17b8830d237ec61bb380a26c233d7facdaae72fda65522135f8fa39c4da1171c4113c854acc85dfefabf4303853d5608a8e0e36fb683c12304e6aaf2d69998d2911eec0d1d96f3b77c644bc14b589e4d7731", 0xaa, 0x10a8a245}, {&(0x7f0000000200)="97bebea3ce2396d0c2e936572eb8454ca82184df04b2c51d09d8f420a3b51f2df830956c9d804227a4c0365083112fc2eb4b651ab77ef7fec0a6028993f8c8c29258faf2b837addae650738b492c3adabc13f13abbdcc9810695c2b34f5e4d6908b7eb65a9e1a57c6b3c13ddcca754669aeaa13c7803daf74cf52a963cd7ca7ca11f", 0x82, 0x5}], 0xb8c3b4c1c574c96f, &(0x7f00000007c0)=ANY=[@ANYBLOB="757365725f78617474722c757365725f78617474722c61636c2c7569643df119bd4e61d9b7e343631eb53f666c0affd14761e910a106c5770573299f3712b9aacb095e414427401e79589eaf85e2ce64531d915be2ae6754549130def6b2b058dfd9fdbe24feb6f1e4ac2c70aeb8dcb1bd3a2f7b", @ANYRESDEC=r3, @ANYBLOB="2c61707072616973655f747970653d696d617369672c686173682c636f6e7409000000b96e636f6e66696e65645f913547dea18de44670653d2c7063723d30303030303030303030303030303030303034362c004a864c8d88239fe7dd6a0e670a65dbb7b544163f8431db1dfd09efe53adc9f8d5e8eaa6ac34a5fa964d9425facd38facd8feb89cf79bef157ff253ebf550382d47ed8be880025b14df504482584e6d17e628f6098a50ea40c8ccb8db72e04fa01282e1b3b0b8f8b5c1df43f6dc5e574f2cc5"]) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040)={0x2, 0x2}, 0x2) 09:06:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:36 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x1c1383, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000014c0)={{0xbf, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x2, 'lblc\x00', 0x10, 0x7, 0x1}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x4e21, 0x3, 0xbfee, 0xfa4, 0x8}}, 0x44) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000380)={'filter\x00', 0x0, 0x3, 0xed, [], 0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}], &(0x7f0000000280)=""/237}, &(0x7f0000000100)=0x78) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000040)={{0x87, @dev={0xac, 0x14, 0x14, 0x25}, 0x4e20, 0x2, 'lblcr\x00', 0xb, 0x6, 0x4b}, {@empty, 0x4e21, 0x4, 0x1f, 0x1f, 0x4}}, 0x44) r2 = socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000140)={'brout\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00\xff\xff\xff\x00\x04\x00\x02', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x50) 09:06:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:36 executing program 2: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x20000) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000180)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x101000) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f0000000300)=""/4096) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYRES16=0x0]) 09:06:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:36 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 09:06:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 335.005861][T13415] fuse: Bad value for 'fd' [ 335.067594][T13417] fuse: Bad value for 'fd' 09:06:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 335.385165][T13432] fuse: Bad value for 'fd' [ 335.433275][T13430] fuse: Bad value for 'fd' [ 335.480689][T13435] fuse: Bad value for 'fd' 09:06:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 335.785777][T13446] fuse: Bad value for 'fd' 09:06:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 335.837013][T13445] fuse: Bad value for 'fd' 09:06:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 335.877091][T13454] fuse: Bad value for 'fd' 09:06:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 336.072237][T13462] fuse: Bad value for 'fd' 09:06:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 336.137787][T13468] fuse: Bad value for 'fd' 09:06:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 336.254982][T13460] fuse: Bad value for 'fd' [ 336.308484][T13469] fuse: Bad value for 'fd' 09:06:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 336.700432][T13487] fuse: Bad value for 'fd' 09:06:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 336.839870][T13490] fuse: Bad value for 'fd' 09:06:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 337.136014][T13502] fuse: Bad value for 'fd' 09:06:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:39 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 337.354384][T13523] fuse: Bad value for 'fd' 09:06:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 338.299249][T13559] fuse: Bad value for 'fd' [ 338.352815][T13561] fuse: Bad value for 'fd' 09:06:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 338.415890][T13562] fuse: Bad value for 'fd' 09:06:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 338.980479][T13583] fuse: Bad value for 'fd' 09:06:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 339.330690][T13599] fuse: Bad value for 'fd' 09:06:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r4, 0x0, 0x8800000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 339.744635][T13617] fuse: Bad value for 'fd' 09:06:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 341.003391][T13679] fuse: Bad value for 'fd' 09:06:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 341.254544][T13689] fuse: Bad value for 'fd' 09:06:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 341.469236][T13694] fuse: Bad value for 'fd' 09:06:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 341.876247][T13713] fuse: Bad value for 'fd' 09:06:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 342.112516][T13727] fuse: Bad value for 'fd' 09:06:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 342.435363][T13743] fuse: Bad value for 'fd' 09:06:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 344.807525][T13848] fuse: Bad value for 'fd' 09:06:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 344.954079][T13854] fuse: Bad value for 'fd' 09:06:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 345.637436][T13888] fuse: Bad value for 'fd' 09:06:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 345.961147][ T26] audit: type=1800 audit(1567156008.578:41): pid=13905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16977 res=0 09:06:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') fstatfs(r0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:48 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 346.299413][ T26] audit: type=1800 audit(1567156008.915:42): pid=13921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16865 res=0 [ 346.364571][T13926] fuse: Bad value for 'fd' 09:06:49 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 346.636555][T13939] fuse: Bad value for 'fd' [ 346.653230][ T26] audit: type=1800 audit(1567156009.262:43): pid=13940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16833 res=0 09:06:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 3: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 3: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:50 executing program 5: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:50 executing program 3: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:50 executing program 5: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:51 executing program 5: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 349.015245][ T26] audit: type=1800 audit(1567156011.603:44): pid=14050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17091 res=0 09:06:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:51 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 349.406140][ T26] audit: type=1800 audit(1567156011.990:45): pid=14071 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17089 res=0 09:06:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 349.824125][ T26] audit: type=1800 audit(1567156012.406:46): pid=14092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17089 res=0 09:06:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(0x0, 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(0x0, 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(0x0, 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 0: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:54 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 352.153052][T14204] fuse: Bad value for 'fd' 09:06:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:54 executing program 0: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:55 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 352.538845][T14226] fuse: Bad value for 'fd' 09:06:55 executing program 0: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 352.877743][T14236] fuse: Bad value for 'fd' 09:06:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 353.383998][T14271] fuse: Bad value for 'fd' 09:06:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 353.698780][T14283] fuse: Bad value for 'fd' 09:06:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 353.888727][ T26] audit: type=1800 audit(1567156016.432:47): pid=14288 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16485 res=0 [ 354.043961][T14299] fuse: Bad value for 'fd' 09:06:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 354.146638][T14305] fuse: Bad value for 'fd' 09:06:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:56 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 354.410123][ T26] audit: type=1800 audit(1567156016.958:48): pid=14311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17113 res=0 [ 354.483699][T14324] fuse: Bad value for 'fd' 09:06:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:06:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 354.817849][T14336] fuse: Bad value for 'fd' 09:06:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:06:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:06:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:58 executing program 4: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(r0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:58 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:06:59 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 356.499148][T14426] fuse: Bad value for 'fd' [ 356.691497][T14438] fuse: Missing mount parameter(s) 09:06:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:59 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:06:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:59 executing program 4: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:06:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 356.970813][T14456] fuse: Missing mount parameter(s) 09:06:59 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:06:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000600)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:06:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:06:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:06:59 executing program 4: r0 = syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 357.256854][T14462] fuse: Missing mount parameter(s) [ 357.297775][T14475] fuse: Missing mount parameter(s) 09:06:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:06:59 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:06:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000600)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:00 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 357.728083][T14490] fuse: Missing mount parameter(s) 09:07:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:07:00 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000600)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:00 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 358.115298][T14510] fuse: Missing mount parameter(s) 09:07:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:01 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 359.088308][T14556] fuse: Bad value for 'fd' 09:07:01 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 359.280791][ T26] audit: type=1800 audit(1567156021.788:49): pid=14559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17148 res=0 09:07:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) 09:07:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 359.718757][T14582] fuse: Bad value for 'group_id' 09:07:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) 09:07:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 359.952438][T14593] fuse: Bad value for 'group_id' 09:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 360.022123][T14600] fuse: Bad value for 'group_id' 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) 09:07:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:02 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 360.290381][T14611] fuse: Bad value for 'group_id' 09:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) [ 360.418542][T14617] fuse: Bad value for 'group_id' 09:07:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 360.629244][T14630] fuse: Bad value for 'fd' 09:07:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) [ 360.769581][T14636] fuse: Missing mount parameter(s) 09:07:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB]) [ 360.872462][T14644] fuse: Bad value for 'fd' 09:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 361.051092][T14647] fuse: Missing mount parameter(s) 09:07:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 361.077131][T14651] fuse: Missing mount parameter(s) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) 09:07:03 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 361.391709][T14665] fuse: Missing mount parameter(s) 09:07:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) [ 361.520125][T14670] fuse: Missing mount parameter(s) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) 09:07:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 361.709944][T14682] fuse: Missing mount parameter(s) 09:07:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) [ 361.876511][T14689] fuse: Bad value for 'fd' 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 362.019363][T14697] fuse: Missing mount parameter(s) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) 09:07:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:04 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 362.318255][T14708] fuse: Missing mount parameter(s) [ 362.371363][T14717] fuse: Missing mount parameter(s) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) 09:07:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 362.724651][T14733] fuse: Missing mount parameter(s) [ 362.732743][T14737] fuse: Unknown parameter 'grou00000000000000000000' 09:07:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) 09:07:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 363.050919][T14754] fuse: Unknown parameter 'grou00000000000000000000' 09:07:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 363.155250][T14752] fuse: Missing mount parameter(s) 09:07:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) [ 363.355855][T14769] fuse: Unknown parameter 'grou00000000000000000000' 09:07:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:05 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 363.550620][T14775] fuse: Unknown parameter 'grou00000000000000000000' 09:07:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) [ 363.682808][T14783] fuse: Unknown parameter 'group_i00000000000000000000' 09:07:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB]) [ 363.952272][T14796] fuse: Unknown parameter 'grou00000000000000000000' 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) [ 364.149578][T14809] fuse: Unknown parameter 'group_i00000000000000000000' 09:07:06 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 364.273256][T14816] fuse: Unknown parameter 'grou00000000000000000000' 09:07:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f0000000500)) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 364.478149][T14821] fuse: Unknown parameter 'group_i00000000000000000000' 09:07:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB]) [ 364.613663][T14828] fuse: Unknown parameter 'group_i00000000000000000000' 09:07:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) 09:07:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 364.880490][T14841] fuse: Unknown parameter 'group_id00000000000000000000' [ 364.883389][T14843] fuse: Bad value for 'fd' 09:07:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 365.139609][T14855] fuse: Unknown parameter 'group_i00000000000000000000' 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 365.228418][T14861] fuse: Unknown parameter 'group_id00000000000000000000' 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) [ 365.288753][T14863] fuse: Bad value for 'fd' 09:07:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 365.590095][T14880] fuse: Unknown parameter 'group_id00000000000000000000' [ 365.601563][T14879] fuse: Unknown parameter 'group_i00000000000000000000' [ 365.622527][T14881] fuse: Bad value for 'fd' 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) 09:07:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 365.936417][T14897] fuse: Bad value for 'user_id' 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 365.997519][T14898] fuse: Unknown parameter 'group_id00000000000000000000' 09:07:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) 09:07:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:08 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 366.323429][T14910] fuse: Bad value for 'user_id' [ 366.353957][T14922] fuse: Bad value for 'fd' [ 366.433943][T14923] fuse: Bad value for 'fd' 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) [ 366.615516][T14927] fuse: Bad value for 'user_id' 09:07:09 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 366.761128][T14943] fuse: Bad value for 'fd' 09:07:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 366.802451][T14944] fuse: Bad value for 'fd' 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 366.969044][T14949] fuse: Bad value for 'fd' 09:07:09 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 367.117825][T14965] fuse: Bad value for 'fd' 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 367.166976][T14964] fuse: Bad value for 'user_id' [ 367.288136][T14973] fuse: Bad value for 'fd' 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x0, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:09 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 367.606094][T14985] fuse: Bad value for 'user_id' [ 367.661893][T14990] fuse: Bad value for 'fd' 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x0, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 367.940898][T14999] fuse: Bad value for 'user_id' 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 368.031647][T15007] fuse: Bad value for 'fd' 09:07:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x0, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 368.184164][T15012] fuse: Missing mount parameter(s) 09:07:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:07:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 368.352908][T15017] fuse: Bad value for 'fd' [ 368.388835][T15024] fuse: Bad value for 'fd' 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x0, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:10 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) [ 368.616232][T15031] fuse: Missing mount parameter(s) [ 368.684653][T15039] fuse: Bad value for 'fd' 09:07:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:07:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 368.809326][T15043] fuse: Bad value for 'fd' 09:07:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x0, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 369.012771][T15052] fuse: Invalid rootmode [ 369.052064][T15053] fuse: Missing mount parameter(s) 09:07:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 369.239075][T15063] fuse: Bad value for 'fd' 09:07:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x0, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 369.397526][T15071] fuse: Invalid rootmode 09:07:11 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x0, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 369.663345][T15080] fuse: Bad value for 'fd' [ 369.702391][T15081] fuse: Bad value for 'fd' [ 369.732159][T15087] fuse: Invalid rootmode 09:07:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, 0x0, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x0, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 370.080118][T15102] fuse: Bad value for 'fd' [ 370.090582][T15104] fuse: Bad value for 'rootmode' 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 370.217784][T15113] fuse: Bad value for 'fd' 09:07:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x0, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 370.398516][T15120] fuse: Bad value for 'rootmode' [ 370.443362][T15122] fuse: Bad value for 'fd' 09:07:12 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 370.470883][T15117] fuse: Bad value for 'fd' 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) [ 370.786852][T15138] fuse: Bad value for 'rootmode' [ 370.807969][T15139] fuse: Invalid rootmode 09:07:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 371.011082][T15147] fuse: Bad value for 'group_id' [ 371.122274][T15155] fuse: Unknown parameter 'use00000000000000000000' 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) 09:07:13 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x0, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 371.309296][T15159] fuse: Invalid rootmode [ 371.328333][T15165] fuse: Bad value for 'group_id' 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) [ 371.397460][T15168] fuse: Unknown parameter 'use00000000000000000000' [ 371.635989][T15178] fuse: Bad value for 'group_id' [ 371.663242][T15179] fuse: Invalid rootmode 09:07:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x0, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 371.833606][T15190] fuse: Unknown parameter 'use00000000000000000000' 09:07:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 09:07:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x0, 0x200800000}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 371.970127][T15195] fuse: Bad value for 'rootmode' [ 372.023954][T15197] fuse: Missing mount parameter(s) [ 372.189662][T15206] fuse: Unknown parameter 'user_i00000000000000000000' 09:07:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) 09:07:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 372.437751][T15217] fuse: Unknown parameter 'user_i00000000000000000000' [ 372.489842][T15219] fuse: Missing mount parameter(s) [ 372.516162][T15221] fuse: Bad value for 'rootmode' 09:07:14 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 372.660751][T15230] fuse: Bad value for 'fd' 09:07:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev}}, 0x5, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) [ 372.783033][T15239] fuse: Unknown parameter 'user_i00000000000000000000' [ 372.790109][T15237] fuse: Missing mount parameter(s) [ 372.814646][T15238] fuse: Bad value for 'rootmode' 09:07:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 373.005150][T15249] fuse: Bad value for 'fd' 09:07:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00350d07d41b6cc22f691f750d4a8ffacc45c7ee3aeb00f5d26d6c4196c90ead5b703814a527da9242773c6b0148806f28592cc03e5698caa81e9431e265dc14648fa6afb4e0b13a2306c25988d071e764d89f0668e54773c9f56640d698540ff013f102852b264f28910a1edda43f583a0974d2ed7a8221a2f71a32be83a46419c32a0b19191093faabaebdb88fd190c19fc425ba5c3aa76093d923e710ad1c9f6e5f91bf11c6d6d79b68c76adf88652f802e410fc6dfba5a82d0ca5a3656b61513c0da6d5ad2ae275e3ab04cee91aa7d9c8ba5850f1ebbaf768bb7c4179be36988a39263f1d8cf549a8328ac47ccd5a6a06e4e9f732c454dc66c8a56b1dc42bf5c8b1632af71dc31fde7e02477d20d10c5744fe010e4d12326244a3fb3f01336f41a"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 373.113575][T15252] fuse: Missing mount parameter(s) 09:07:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) [ 373.197605][T15259] fuse: Unknown parameter 'use00000000000000000000' 09:07:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x0, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:07:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 373.254326][T15258] fuse: Unknown parameter 'user_id00000000000000000000' 09:07:15 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 373.397152][T15266] fuse: Missing mount parameter(s) 09:07:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) 09:07:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x0, 0x200800000}, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 373.582103][T15279] fuse: Unknown parameter 'use00000000000000000000' [ 373.586022][T15276] fuse: Missing mount parameter(s) [ 373.616603][T15280] fuse: Unknown parameter 'user_id00000000000000000000' 09:07:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 09:07:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x0, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 373.947809][T15296] fuse: Unknown parameter 'use00000000000000000000' [ 373.966065][T15295] fuse: Missing mount parameter(s) [ 373.982591][T15299] fuse: Unknown parameter 'user_id00000000000000000000' 09:07:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x0, 0x200800000}, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) 09:07:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 374.085022][T15300] fuse: Missing mount parameter(s) 09:07:16 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x0, 0x1000, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) 09:07:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) [ 374.264602][T15313] fuse: Bad value for 'fd' [ 374.334792][T15314] kasan: CONFIG_KASAN_INLINE enabled [ 374.356900][T15314] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 374.374043][T15319] fuse: Unknown parameter 'grou00000000000000000000' 09:07:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x1000, 0x4, 0x0, 0x200800000}, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) fstatfs(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(0xffffffffffffffff, &(0x7f0000001440), 0x1210) [ 374.396854][T15315] fuse: Unknown parameter 'user_i00000000000000000000' [ 374.426285][T15314] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 374.433545][T15314] CPU: 0 PID: 15314 Comm: syz-executor.5 Not tainted 5.3.0-rc6-next-20190827 #74 [ 374.439948][ T3891] kobject: 'loop1' (0000000028ab8577): kobject_uevent_env [ 374.442762][T15314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.452885][T15318] kobject: '0:56' (0000000048c40d05): kobject_add_internal: parent: 'bdi', set: 'devices' [ 374.460310][T15314] RIP: 0010:kstrtouint+0x85/0x1a0 [ 374.460323][T15314] Code: 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 fc 32 32 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 db 00 00 00 [ 374.460330][T15314] RSP: 0018:ffff88809519f9e0 EFLAGS: 00010246 [ 374.460341][T15314] RAX: dffffc0000000000 RBX: ffff88809519fb38 RCX: ffffc900109ba000 [ 374.460362][T15314] RDX: 0000000000000000 RSI: ffffffff833ffad4 RDI: 0000000000000000 [ 374.479942][ T3891] kobject: 'loop1' (0000000028ab8577): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 374.495668][T15314] RBP: ffff88809519fa70 R08: ffff888054988100 R09: ffffed1015d06af5 [ 374.495676][T15314] R10: ffffed1015d06af4 R11: ffff8880ae8357a3 R12: 0000000000000000 [ 374.495683][T15314] R13: 1ffff11012a33f3d R14: ffff88809519fa48 R15: 0000000000000000 [ 374.495694][T15314] FS: 00007fbb48d26700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 374.495705][T15314] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 374.495722][T15314] CR2: 0000001b2f524000 CR3: 000000009c746000 CR4: 00000000001406f0 [ 374.515793][T15318] kobject: '0:56' (0000000048c40d05): kobject_uevent_env [ 374.518342][T15314] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 374.518351][T15314] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 374.518356][T15314] Call Trace: [ 374.518375][T15314] ? __x64_sys_mount+0xbe/0x150 [ 374.518393][T15314] ? _kstrtoul+0x170/0x170 [ 374.538601][ T3891] kobject: 'loop0' (0000000012ef42c2): kobject_uevent_env [ 374.544912][T15314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.544928][T15314] fs_parse+0xde1/0x1080 [ 374.544949][T15314] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.582456][T15318] kobject: '0:56' (0000000048c40d05): fill_kobj_path: path = '/devices/virtual/bdi/0:56' [ 374.584960][T15314] fuse_parse_param+0xac/0x750 [ 374.584987][T15314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.596602][ T3891] kobject: 'loop0' (0000000012ef42c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 374.601392][T15314] ? process_init_reply+0x1650/0x1650 [ 374.601409][T15314] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 374.601421][T15314] ? __lookup_constant+0xd6/0x100 [ 374.601439][T15314] ? process_init_reply+0x1650/0x1650 [ 374.611960][T15325] fuse: Unknown parameter 'grou00000000000000000000' [ 374.614136][T15314] vfs_parse_fs_param+0x2ca/0x540 [ 374.614159][T15314] vfs_parse_fs_string+0x105/0x170 [ 374.689124][ T3891] kobject: 'loop0' (0000000012ef42c2): kobject_uevent_env [ 374.692262][T15314] ? vfs_parse_fs_param+0x540/0x540 [ 374.692279][T15314] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 374.692299][T15314] ? process_init_reply+0x1650/0x1650 [ 374.699075][ T3891] kobject: 'loop0' (0000000012ef42c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 374.704065][T15314] generic_parse_monolithic+0x181/0x200 [ 374.704078][T15314] ? vfs_parse_fs_string+0x170/0x170 [ 374.704093][T15314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.704110][T15314] ? alloc_fs_context+0x434/0x6d0 [ 374.750838][T15329] fuse: Unknown parameter 'grou00000000000000000000' [ 374.754253][T15314] ? vfs_parse_fs_string+0x170/0x170 [ 374.754270][T15314] parse_monolithic_mount_data+0x69/0x90 [ 374.754298][T15314] do_mount+0x1369/0x1c30 [ 374.754321][T15314] ? copy_mount_string+0x40/0x40 [ 374.792513][ T3891] kobject: 'loop0' (0000000012ef42c2): kobject_uevent_env [ 374.794603][T15314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 374.802077][ T3891] kobject: 'loop0' (0000000012ef42c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 374.808453][T15314] ? copy_mount_options+0x2e8/0x3f0 [ 374.808465][T15314] ksys_mount+0xdb/0x150 [ 374.808479][T15314] __x64_sys_mount+0xbe/0x150 [ 374.808501][T15314] do_syscall_64+0xfa/0x760 [ 374.838444][T15314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.844337][T15314] RIP: 0033:0x459879 [ 374.847527][T15331] fuse: Unknown parameter 'group_i00000000000000000000' [ 374.848232][T15314] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 374.848239][T15314] RSP: 002b:00007fbb48d25c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 374.848252][T15314] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459879 09:07:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0, @ANYBLOB]) 09:07:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB]) [ 374.848259][T15314] RDX: 0000000020000080 RSI: 00000000200003c0 RDI: 0000000000000000 [ 374.848272][T15314] RBP: 000000000075bf20 R08: 0000000020000180 R09: 0000000000000000 [ 374.900204][ T3891] kobject: 'loop0' (0000000012ef42c2): kobject_uevent_env [ 374.901921][T15314] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbb48d266d4 [ 374.914887][ T3891] kobject: 'loop0' (0000000012ef42c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 374.918640][T15314] R13: 00000000004c5e8b R14: 00000000004da9d8 R15: 00000000ffffffff 09:07:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23}}, 0x0, 0x0, 0x0, 0x0, 0x44}, &(0x7f0000000600)=0x98) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0, @ANYBLOB]) [ 374.918653][T15314] Modules linked in: [ 374.956993][ T9026] kobject: '0:56' (0000000048c40d05): kobject_uevent_env [ 374.964636][T15320] fuse: Missing mount parameter(s) [ 374.969259][ T9026] kobject: '0:56' (0000000048c40d05): fill_kobj_path: path = '/devices/virtual/bdi/0:56' [ 375.023261][ T3891] kobject: 'loop3' (00000000b3bc3458): kobject_uevent_env [ 375.025924][ T9026] kobject: '0:56' (0000000048c40d05): kobject_cleanup, parent 000000004187fdab [ 375.039302][T15335] fuse: Unknown parameter 'group_i00000000000000000000' [ 375.054201][T15333] kobject: '0:57' (0000000014e0cf1a): kobject_add_internal: parent: 'bdi', set: 'devices' 09:07:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000600)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 09:07:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x5, 0x0, 0x4, 0x2, 0x200800000}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @rand_addr=0xaeb}}, 0xc, 0x0, 0x0, 0x7, 0x44}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x1, 0x40}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180), 0x4) syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x20) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x8, 0x4) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040002,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) read$FUSE(r0, &(0x7f0000001440), 0x1210) [ 375.060018][ T3891] kobject: 'loop3' (00000000b3bc3458): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 375.070954][ T9026] kobject: '0:56' (0000000048c40d05): calling ktype release [ 375.082479][ T9026] kobject: '0:56': free name [ 375.093443][T15333] kobject: '0:57' (0000000014e0cf1a): kobject_uevent_env [ 375.112987][T15333] kobject: '0:57' (0000000014e0cf1a): fill_kobj_path: path = '/devices/virtual/bdi/0:57' [ 375.119425][ T3891] kobject: 'loop2' (00000000f500fc81): kobject_uevent_env [ 375.140962][T15338] fuse: Unknown parameter 'user_i00000000000000000000' [ 375.160652][ T3891] kobject: 'loop2' (00000000f500fc81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 375.187005][ T3891] kobject: 'loop4' (000000003630cf7b): kobject_uevent_env [ 375.205904][ T3891] kobject: 'loop4' (000000003630cf7b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 375.220663][T15341] kobject: '0:56' (00000000962bf1ab): kobject_add_internal: parent: 'bdi', set: 'devices' [ 375.232712][ T3891] kobject: 'loop0' (0000000012ef42c2): kobject_uevent_env [ 375.246797][ T3891] kobject: 'loop0' (0000000012ef42c2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 375.260450][T15341] kobject: '0:56' (00000000962bf1ab): kobject_uevent_env [ 375.262378][T15343] kobject: '0:58' (000000003bbdfde0): kobject_add_internal: parent: 'bdi', set: 'devices' [ 375.279382][T15341] kobject: '0:56' (00000000962bf1ab): fill_kobj_path: path = '/devices/virtual/bdi/0:56' [ 375.287707][T15343] kobject: '0:58' (000000003bbdfde0): kobject_uevent_env [ 375.299345][T15343] kobject: '0:58' (000000003bbdfde0): fill_kobj_path: path = '/devices/virtual/bdi/0:58' [ 375.321569][ T9016] kobject: '0:57' (0000000014e0cf1a): kobject_uevent_env [ 375.344736][T15314] ---[ end trace 83a1d83c922d7757 ]--- [ 375.350588][T15314] RIP: 0010:kstrtouint+0x85/0x1a0 [ 375.356128][T15314] Code: 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 fc 32 32 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 db 00 00 00 [ 375.376803][ T9016] kobject: '0:57' (0000000014e0cf1a): fill_kobj_path: path = '/devices/virtual/bdi/0:57' [ 375.379241][ T9018] kobject: '0:58' (000000003bbdfde0): kobject_uevent_env [ 375.394965][T15314] RSP: 0018:ffff88809519f9e0 EFLAGS: 00010246 [ 375.401019][ T9016] kobject: '0:57' (0000000014e0cf1a): kobject_cleanup, parent 000000004187fdab [ 375.403403][T15314] RAX: dffffc0000000000 RBX: ffff88809519fb38 RCX: ffffc900109ba000 [ 375.417465][ T9016] kobject: '0:57' (0000000014e0cf1a): calling ktype release [ 375.426769][ T9016] kobject: '0:57': free name [ 375.430214][ T9018] kobject: '0:58' (000000003bbdfde0): fill_kobj_path: path = '/devices/virtual/bdi/0:58' [ 375.436461][ T3891] kobject: 'loop1' (0000000028ab8577): kobject_uevent_env [ 375.443809][T15314] RDX: 0000000000000000 RSI: ffffffff833ffad4 RDI: 0000000000000000 [ 375.451774][ T3891] kobject: 'loop1' (0000000028ab8577): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 375.458507][T15314] RBP: ffff88809519fa70 R08: ffff888054988100 R09: ffffed1015d06af5 [ 375.468923][ T9018] kobject: '0:58' (000000003bbdfde0): kobject_cleanup, parent 000000004187fdab [ 375.480460][T15314] R10: ffffed1015d06af4 R11: ffff8880ae8357a3 R12: 0000000000000000 [ 375.497576][ T9018] kobject: '0:58' (000000003bbdfde0): calling ktype release [ 375.505507][ T9018] kobject: '0:58': free name [ 375.505744][ T9026] kobject: '0:56' (00000000962bf1ab): kobject_uevent_env [ 375.514746][ T3891] kobject: 'loop2' (00000000f500fc81): kobject_uevent_env [ 375.517652][ T9026] kobject: '0:56' (00000000962bf1ab): fill_kobj_path: path = '/devices/virtual/bdi/0:56' [ 375.527350][ T3891] kobject: 'loop2' (00000000f500fc81): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 375.536642][T15314] R13: 1ffff11012a33f3d R14: ffff88809519fa48 R15: 0000000000000000 [ 375.587751][ T9026] kobject: '0:56' (00000000962bf1ab): kobject_cleanup, parent 000000004187fdab [ 375.597696][ T9026] kobject: '0:56' (00000000962bf1ab): calling ktype release [ 375.608077][ T9026] kobject: '0:56': free name [ 375.617482][ T3891] kobject: 'loop4' (000000003630cf7b): kobject_uevent_env [ 375.617738][T15314] FS: 00007fbb48d26700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 375.625409][ T3891] kobject: 'loop4' (000000003630cf7b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 375.636470][T15314] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 375.651355][T15314] CR2: 000000000070f158 CR3: 000000009c746000 CR4: 00000000001406f0 [ 375.660266][T15314] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 375.668390][T15314] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 375.677221][T15314] Kernel panic - not syncing: Fatal exception [ 375.685963][T15314] Kernel Offset: disabled [ 375.690730][T15314] Rebooting in 86400 seconds..